PeopleSoft Security



Course DateStart TimeEnd TimeTime ZoneLocationDaysPrice
Sep 13, 202209:0005:00EDTToronto - In Class or by Video Conference4$4,000 USDPurchase
Nov 21, 202209:0005:00ESTToronto - In Class or by Video Conference4$4,000 USDPurchase

PeopleSoft Security

This PeopleSoft Security Rel 8.57 training teaches you to design and implement PeopleSoft Security. Learn the steps needed to effectively organize, implement, administer and evaluate PeopleSoft security.

Applies to 8.57

Learn To:

  • Secure PeopleSoft applications by creating permission lists, roles and user profiles.
  • Control access and authorization to client-based and browser-based PeopleTools.
  • Monitor database tables using three types of auditing.
  • Use PeopleSoft Encryption Technology to control data privacy, integrity and authentication.
  • Import digital certificates into database and Java keystores.
  • Secure queries, batch processes, and reports.
  • Maintain portal registry security.
  • Configure single sign-on among PeopleSoft applications.
  • Review configuring PeopleSoft applications to use directory servers to authenticate PeopleSoft users.

Benefits to You

Better understand PeopleSoft security tools and technologies to manage and maintain your security infrastructure. Hands-on classroom activities let you use and become familiar with the security tools and technologies, and help you begin to evaluate how to use them in your organization.

Note: This course does not cover application-specific security such as HR, Financials, and EPM-specific data permissions or row-level security.


  • Understanding of basic navigation and PeopleSoft concepts.
  • Working knowledge of PeopleSoft Architecture.
  • Experience with the Eight Steps of Application Development.
  • Understanding of your company's security requirements.


  • Developers
  • Implementers
  • Managers
  • System Integrators
  • Suitable for students using PeopleTools 8.54 or later.


  • Implement application and PeopleTools security.
  • Implement security for batch processing and reporting.
  • Administer portal and signon security.
  • Maintain security definitions among multiple databases.
  • Review how to administer PeopleSoft security by using a directory.
  • Describe security design and administration in PeopleSoft Internet Architecture.


Working with Permission Lists

  • Describing Application Security
  • Creating Permission Lists
  • Copying Permission
  • Lists Deleting Permission Lists

Working with Roles

  • Creating Roles
  • Copying Roles
  • Deleting Roles

Managing Advanced Application Security

  • Defining User Profile Types
  • Deleting User Profile Data
  • Configuring Distributed User Profile Assignment
  • Configuring Dynamic Role Assignment

Auditing Security Tables

  • Configuring Field Audits
  • Configuring Record Audits
  • Configuring Database-Level Audits

Managing PeopleTools Security

  • Securing Client-Based PeopleTools
  • Managing Definition Security
  • Implementing Change Control

Encrypting Data

  • Describing Data Encryption
  • Loading Encryption Libraries
  • Viewing Algorithm Chains and Keysets
  • Defining Encryption Profiles
  • Attaching Encryption PeopleCode
  • Using PSCipher to Encrypt Text

Using Digital Certificates

  • Describing Public Key Infrastructure
  • Describing Digital Certificates
  • Obtaining Digital Certificates
  • Importing Digital Certificates
  • Requesting and Importing Digital Certificates into the Database Keystore
  • Requesting and Importing Digital Certificates into the Java Keystore

Securing Processes

  • Describing Process Security
  • Granting Access to Components
  • Securing Process Definitions
  • Securing Process Groups
  • Configuring Process Profile Permissions
  • Using Reporting Console

Administering Query Security

  • Creating Query Profiles
  • Creating Query Access Groups
  • Implementing Query Row-Level Security

Maintaining Portal Registry Security

  • Describing Portal Registry Security
  • Working with Portal Registry Security
  • Viewing Security Details

Maintaining security definitions among multiple database

  • Transferring security definitions between databases
  • Synchronizing user profile data among databases
  • Configuring user profile synchronization
  • Implementing configurable user profile synchronization
Right Menu IconMENU