Course Date | Start Time | End Time | Time Zone | Location | Days | Price | |
---|---|---|---|---|---|---|---|
Oct 16, 2023 | 09:00 | 05:00 | EDT | Live Virtual Class | 4 | $4,000 USD | Purchase |
Nov 13, 2023 | 09:00 | 05:00 | EST | Live Virtual Class | 4 | $4,000 USD | Purchase |
PeopleSoft Security
This PeopleSoft Security Rel 8.57 training teaches you to design and implement PeopleSoft Security. Learn the steps needed to effectively organize, implement, administer and evaluate PeopleSoft security. Better understand PeopleSoft security tools and technologies to manage and maintain your security infrastructure. Hands-on classroom activities let you use and become familiar with the security tools and technologies, and help you begin to evaluate how to use them in your organization. Suitable for students using PeopleTools 8.54 or later. Note: this course does not cover application-specific security such as HR, Financials, and EPM-specific data permissions or row-level security.
Prerequisites
- Understanding of basic navigation and PeopleSoft concepts
- Working knowledge of PeopleSoft Architecture
- Experience with the eight steps of application development
- Understanding of your company's security requirements
Audience
- Developers
- Implementers
- Managers
- System Integrators
Learning Objectives
- Implement application and PeopleTools security
- Secure queries, batch processes, and reports
- Maintain portal registry security
- Configure single sign-on among PeopleSoft applications
- Administer portal and sign-on security
- Maintain security definitions among multiple databases
- Review configuring PeopleSoft applications to use directory servers to authenticate PeopleSoft users
- Describe security design and administration in PeopleSoft Internet Architecture
- Secure PeopleSoft applications by creating permission lists, roles and user profiles
- Control access and authorization to client-based and browser-based PeopleTools
- Monitor database tables using three types of auditing
- Use PeopleSoft Encryption Technology to control data privacy, integrity and authentication
- Import digital certificates into database and Java keystores
Topics
- Working with Permission Lists
- Working with Roles
- Managing Advanced Application Security
- Auditing Security Tables
- Managing PeopleTools Security
- Encrypting Data
- Using Digital Certificates
- Securing Processes
- Administering Query Security
- Maintaining Portal Registry Security
- Maintaining Security Definitions Among Multiple Databases