PeopleSoft Security Rel 8.48 - Self-Study Course

PeopleSoft Security Rel 8.48 - Self-Study Course

Oracle University
Logo Oracle University

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

This course teaches you to design and implement PeopleTools security that is common to all PeopleSoft applications. Discuss the best practices of security organization and implementation. Explore the capabilities of application security by creating permission lists, roles, and user profiles. Use development security to control PeopleTools such as Application Designer, Process Scheduler, Query, and Data Mover.

Use data encryption technology to hide sensitive data at the database level. Learn to monitor tables using three types of auditing. Secure queries, batch processes, and reports. Learn to configure single sign-on among PeopleSoft applications and how you can configure PeopleSoft applicat…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

This course teaches you to design and implement PeopleTools security that is common to all PeopleSoft applications. Discuss the best practices of security organization and implementation. Explore the capabilities of application security by creating permission lists, roles, and user profiles. Use development security to control PeopleTools such as Application Designer, Process Scheduler, Query, and Data Mover.

Use data encryption technology to hide sensitive data at the database level. Learn to monitor tables using three types of auditing. Secure queries, batch processes, and reports. Learn to configure single sign-on among PeopleSoft applications and how you can configure PeopleSoft applications to use directory servers to authenticate PeopleSoft users.

Note: This course does not cover application-specific security such as HR, Financials, and EPM specific data permissions or row-level security

Learn to:
  • Create formulas
  • Display tabular and charted data
  • Link multiple reports as sub-reports
  • Use PeopleSoft Process Scheduler to run reports
  • Apply criteria within reports



Audience
  • Technical Consultant
  • Technical Administrator

Course Topics Describing Information Security
  • Discussing Information Security
  • Listing Security Levels
Working with Permission Lists
  • Describing Application Security
  • Creating Permission Lists
  • Copying Permission Lists
  • Deleting Permission Lists
Working with Roles
  • Creating Roles
  • Copying Roles
  • Deleting Roles
Working with User Profiles
  • Creating User Profiles
  • Copying User Profiles
Managing Advanced Application Security
  • Defining User Profile Types
  • Deleting User Profile Data
  • Configuring Distributed User Profile Assignment
  • Configuring Dynamic Role Assignment
  • Managing Security Definitions
Auditing Security Tables
  • Configuring Field Audits
  • Configuring Record Audits
  • Configuring Database Level Audits
Managing PeopleTools Security
  • Securing Client-Based PeopleTools
  • Managing Definition Security
  • Implementing Change Control
Encrypting Data
  • Describing Data Encryption
  • Describing Pluggable Cryptography
  • Viewing Algorithm Chains and Key-sets
  • Defining Encryption Profiles
  • Attaching Encryption PeopleCode
Securing Processes
  • Securing Process Definitions
  • Securing Process Groups
  • Configuring Process Profile Permissions
  • Using Report Manager
Administering Query Security
  • Creating Query Profiles
  • Creating Query Access Groups
  • Implementing Query Row-Level Security
Maintaining Portal Registry Security
  • Working with Portal Registry Security
  • Viewing Security Details
Administering Sign-on Security
  • Describing PeopleSoft Authorization IDs
  • Explaining the Sign-on Process
  • Configuring Password Controls
  • Setting Up Forgotten Password Options
Configuring Single Sign-on
  • Defining Nodes for Single Sign-on
  • Configuring Trusted Nodes
Configuring PeopleSoft Applications for Directory Authentication
  • Describing Directories
  • Explaining Directory Authentication
  • Configuring Directory Authentication
  • Assigning PeopleSoft Roles Using Directory Groups

Course Objectives
  • Administer portal and sign-on security
  • Describe security design and administration in PeopleSoft Internet Architecture
  • Implement application security
  • Implement security for batch processing and reporting
  • Administer security for a directory

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.