PeopleSoft Applications Security Overview Rel 9 - Self-Study Course
Starting dates and places
Description
PeopleSoft Applications Security Overview discusses implementation considerations and steps for establishing data permission security. The overview describes the different layers of security available, with particular focus on row-level security. We examine row-level security in general as well as within each of the different PeopleSoft product lines: Financials and Supply Chain Management, Enterprise Performance Management (EPM), Human Capital Management (HCM) and Customer Relationship Management (CRM).
Learn to:- Identify the components of application security.
- Describe the steps involved in implementing data permission security.
- Explain data permission security within Financials, SCM,…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
PeopleSoft Applications Security Overview discusses implementation considerations and steps for establishing data permission security. The overview describes the different layers of security available, with particular focus on row-level security. We examine row-level security in general as well as within each of the different PeopleSoft product lines: Financials and Supply Chain Management, Enterprise Performance Management (EPM), Human Capital Management (HCM) and Customer Relationship Management (CRM).
Learn to:- Identify the components of application security.
- Describe the steps involved in implementing data permission security.
- Explain data permission security within Financials, SCM, Enterprise Performance Management (EPM), Human Capital Management (HCM), and CRM.
- Describe reporting security for PS Query and PS/nVision.
- Define the PeopleSoft security architecture.
Audience
- Database Administrators
- Web Administrator
- Technical Administrator
- Functional Implementer
- Reports Developer
- Data Warehouse Administrator
Course Topics Technology Overview
- Security in the PeopleSoft Internet Architecture
- Application and Data Permission Security
- Registry Security
- PeopleBooks References
- Identifying the Four Security Layers of the PeopleSoft System
- Describing Permission Lists, Roles and User Profiles
- Defining Portal Registration Security
- Describing Reporting Security
- Explaining Data Permission Security Using Views
- Implementing Data Permission Security Using Views
- Implementing Data Permission Security for PeopleSoft Financials and SCM
- Implementing Reporting Security
- Describing Data Permission Security Methods for PeopleSoft EPM
- Granting Security Access for Roles and Users
- Processing Security Parameters
- Implementing HCM Data Permission Security
- Assigning and Maintaining Data Permissions
- Setting Up Security for Group Build and Global Functionality
- Describing Security for PeopleSoft CRM
- Implementing Application Security for PeopleSoft CRM
Course Objectives
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.