|Course Date||Start Time||End Time||Time Zone||Location||Days||Price|
|Sep 13, 2022||09:00||05:00||EDT||Toronto - In Class or by Video Conference||4||$4,000 USD||Purchase|
|Nov 21, 2022||09:00||05:00||EST||Toronto - In Class or by Video Conference||4||$4,000 USD||Purchase|
This PeopleSoft Security Rel 8.57 training teaches you to design and implement PeopleSoft Security. Learn the steps needed to effectively organize, implement, administer and evaluate PeopleSoft security.
Applies to 8.57
- Secure PeopleSoft applications by creating permission lists, roles and user profiles.
- Control access and authorization to client-based and browser-based PeopleTools.
- Monitor database tables using three types of auditing.
- Use PeopleSoft Encryption Technology to control data privacy, integrity and authentication.
- Import digital certificates into database and Java keystores.
- Secure queries, batch processes, and reports.
- Maintain portal registry security.
- Configure single sign-on among PeopleSoft applications.
- Review configuring PeopleSoft applications to use directory servers to authenticate PeopleSoft users.
Benefits to You
Better understand PeopleSoft security tools and technologies to manage and maintain your security infrastructure. Hands-on classroom activities let you use and become familiar with the security tools and technologies, and help you begin to evaluate how to use them in your organization.
Note: This course does not cover application-specific security such as HR, Financials, and EPM-specific data permissions or row-level security.
- Understanding of basic navigation and PeopleSoft concepts.
- Working knowledge of PeopleSoft Architecture.
- Experience with the Eight Steps of Application Development.
- Understanding of your company's security requirements.
- System Integrators
- Suitable for students using PeopleTools 8.54 or later.
- Implement application and PeopleTools security.
- Implement security for batch processing and reporting.
- Administer portal and signon security.
- Maintain security definitions among multiple databases.
- Review how to administer PeopleSoft security by using a directory.
- Describe security design and administration in PeopleSoft Internet Architecture.
Working with Permission Lists
- Describing Application Security
- Creating Permission Lists
- Copying Permission
- Lists Deleting Permission Lists
Working with Roles
- Creating Roles
- Copying Roles
- Deleting Roles
Managing Advanced Application Security
- Defining User Profile Types
- Deleting User Profile Data
- Configuring Distributed User Profile Assignment
- Configuring Dynamic Role Assignment
Auditing Security Tables
- Configuring Field Audits
- Configuring Record Audits
- Configuring Database-Level Audits
Managing PeopleTools Security
- Securing Client-Based PeopleTools
- Managing Definition Security
- Implementing Change Control
- Describing Data Encryption
- Loading Encryption Libraries
- Viewing Algorithm Chains and Keysets
- Defining Encryption Profiles
- Attaching Encryption PeopleCode
- Using PSCipher to Encrypt Text
Using Digital Certificates
- Describing Public Key Infrastructure
- Describing Digital Certificates
- Obtaining Digital Certificates
- Importing Digital Certificates
- Requesting and Importing Digital Certificates into the Database Keystore
- Requesting and Importing Digital Certificates into the Java Keystore
- Describing Process Security
- Granting Access to Components
- Securing Process Definitions
- Securing Process Groups
- Configuring Process Profile Permissions
- Using Reporting Console
Administering Query Security
- Creating Query Profiles
- Creating Query Access Groups
- Implementing Query Row-Level Security
Maintaining Portal Registry Security
- Describing Portal Registry Security
- Working with Portal Registry Security
- Viewing Security Details
Maintaining security definitions among multiple database
- Transferring security definitions between databases
- Synchronizing user profile data among databases
- Configuring user profile synchronization
- Implementing configurable user profile synchronization