PeopleSoft Security Rel 8.50

Course Fees: $5368.00 excl. GST
Printed Manual: $0.00 excl. GST
Course Duration: 4 days
Course Manual

Sorry, no course dates found

This course teaches you to design and implement PeopleTools security that is common to all PeopleSoft applications. You will discuss the best practices of organizing, implementing, administering, and evaluating PeopleSoft security;

explore the capabilities of application security by creating permission lists, roles, and user profiles; and use development security to control PeopleTools such as Application Designer, Process Scheduler, Query, and Data Mover. You learn to use data encryption technology to hide sensitive data at the database level. Learn to monitor tables using three types of auditing. Secure queries, batch processes, and reports. Learn to configure single sign-on among PeopleSoft applications and how you can configure PeopleSoft applications to use directory servers to authenticate PeopleSoft users.

Note: This course does not cover application-specific security such as HR, Financials, and EPM specific data permissions or row-level security

Learn to:

Secure queries, processes, pages, and elements of the PeopleTools tool set.

Encrypt data.

Integrate PeopleSoft applications with a directory server.

Create and import digital certificates in PeopleSoft applications.

Configure single sign on among PeopleSoft applications.

Create permission lists, roles, and user profiles.

Technical Administrator

Technical Consultant

Security Admnistrators

Working knowledge of PeopleSoft Architecture, Experience with the Eight Steps of Application Development, Understanding of basic navigation and PeopleSoft concepts, Understanding of your company's security requirements
  • Describe security design and administration in PeopleSoft Internet Architecture
  • Implement application security
  • Implement security for batch processing and reporting
  • Administer portal and sign-on security
  • Administer security for a directory
  • Encrypt data
  • Create and import digital certificates
  • Synchronize security across multiple PeopleSoft applications
  • Enable Single Sign on among multiple PeopleSoft applications.
Describing Information Security

Discussing Information Security

Listing Security Levels

Designing and Implementing PeopleSoft Security

Working with Permission Lists

Describing Application Security

Creating Permission Lists

Copying Permission Lists

Deleting Permission Lists

Working with Roles

Creating Roles

Copying Roles

Deleting Roles

Working with User Profiles

Creating User Profiles

Copying User Profiles

Managing Advanced Application Security

Defining User Profile Types

Deleting User Profile Data

Configuring Distributed User Profile Assignment

Configuring Dynamic Role Assignment

Auditing Security Tables

Configuring Field Audits

Configuring Record Audits

Configuring Database Level Audits

Managing PeopleTools Security

Securing Client-Based PeopleTools

Managing Definition Security

Implementing Change Control

Encrypting Data

Describing Data Encryption

Describing Pluggable Cryptography

Viewing Algorithm Chains and Key-sets

Defining Encryption Profiles

Attaching Encryption PeopleCode

Using PSCipher to Encrypt Text

Using Digital Certificates

Describing Public Key Infrastructure

Describing Digital Certificates

Obtaining Digital Certificates

Importing Digital Certificates

Requesting and Importing Digital Certificates into the Database Keystore

Requesting and Importing Digital Certificates into the Java Keystore

Securing Processes

Describing Process Security

Granting Access to Components

Securing Process Definitions

Securing Process Groups

Configuring Process Profile Permissions

Using Reporting Console

Administering Query Security

Creating Query Profiles

Creating Query Access Groups

Implementing Query Row-Level Security

Maintaining Portal Registry Security

Working with Portal Registry Security

Viewing Security Details

Administering Sign-on Security

Describing PeopleSoft Authorization IDs

Explaining the Sign-on Process

Configuring Password Controls

Setting Up Forgotten Password Options

Configuring Single Sign-on

Defining Nodes for Single Sign-on

Configuring Trusted Nodes

Maintaining security definitions among multiple database

Transferring security definitions between databases

Synchronizing user profile data among databases

Configuring PeopleSoft Applications for Directory Authentication

Describing Directories

Explaining Directory Authentication

Configuring Directory Authentication

Assigning PeopleSoft Roles Using Directory Groups