PeopleSoft Security Rel 8.50
Starting dates and places
Description
This course teaches you to design and implement PeopleTools security that is common to all PeopleSoft applications. You will discuss the best practices of organizing, implementing, administering, and evaluating PeopleSoft security; explore the capabilities of application security by creating permission lists, roles, and user profiles; and use development security to control PeopleTools such as Application Designer, Process Scheduler, Query, and Data Mover.
You learn to use data encryption technology to hide sensitive data at the database level. Learn to monitor tables using three types of auditing. Secure queries, batch processes, and reports. Learn to configure single sign-on among PeopleSo…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
This course teaches you to design and implement PeopleTools security that is common to all PeopleSoft applications. You will discuss the best practices of organizing, implementing, administering, and evaluating PeopleSoft security; explore the capabilities of application security by creating permission lists, roles, and user profiles; and use development security to control PeopleTools such as Application Designer, Process Scheduler, Query, and Data Mover.
You learn to use data encryption technology to hide sensitive data at the database level. Learn to monitor tables using three types of auditing. Secure queries, batch processes, and reports. Learn to configure single sign-on among PeopleSoft applications and how you can configure PeopleSoft applications to use directory servers to authenticate PeopleSoft users.
Note: This course does not cover application-specific security such as HR, Financials, and EPM specific data permissions or row-level security
Learn to:- Secure queries, processes, pages, and elements of the PeopleTools tool set.
- Encrypt data.
- Integrate PeopleSoft applications with a directory server.
- Create and import digital certificates in PeopleSoft applications.
- Configure single sign on among PeopleSoft applications.
- Create permission lists, roles, and user profiles.
Audience
- Security Administrators
- Technical Administrator
- Technical Consultant
Course Topics Describing Information Security
- Discussing Information Security
- Listing Security Levels
- Designing and Implementing PeopleSoft Security
- Describing Application Security
- Creating Permission Lists
- Copying Permission Lists
- Deleting Permission Lists
- Creating Roles
- Copying Roles
- Deleting Roles
- Creating User Profiles
- Copying User Profiles
- Defining User Profile Types
- Deleting User Profile Data
- Configuring Distributed User Profile Assignment
- Configuring Dynamic Role Assignment
- Configuring Field Audits
- Configuring Record Audits
- Configuring Database Level Audits
- Securing Client-Based PeopleTools
- Managing Definition Security
- Implementing Change Control
- Describing Data Encryption
- Describing Pluggable Cryptography
- Viewing Algorithm Chains and Key-sets
- Defining Encryption Profiles
- Attaching Encryption PeopleCode
- Using PSCipher to Encrypt Text
- Describing Public Key Infrastructure
- Describing Digital Certificates
- Obtaining Digital Certificates
- Importing Digital Certificates
- Requesting and Importing Digital Certificates into the Database Keystore
- Requesting and Importing Digital Certificates into the Java Keystore
- Describing Process Security
- Granting Access to Components
- Securing Process Definitions
- Securing Process Groups
- Configuring Process Profile Permissions
- Using Reporting Console
- Creating Query Profiles
- Creating Query Access Groups
- Implementing Query Row-Level Security
- Working with Portal Registry Security
- Viewing Security Details
- Describing PeopleSoft Authorization IDs
- Explaining the Sign-on Process
- Configuring Password Controls
- Setting Up Forgotten Password Options
- Defining Nodes for Single Sign-on
- Configuring Trusted Nodes
- Transferring security definitions between databases
- Synchronizing user profile data among databases
- Describing Directories
- Explaining Directory Authentication
- Configuring Directory Authentication
- Assigning PeopleSoft Roles Using Directory Groups
Course Objectives
- Describe security design and administration in PeopleSoft Internet Architecture
- Implement application security
- Implement security for batch processing and reporting
- Administer portal and sign-on security
- Administer security for a directory
- Encrypt data
- Create and import digital certificates
- Synchronize security across multiple PeopleSoft applications
- Enable Single Sign on among multiple PeopleSoft applications.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.