SECURING PEOPLESOFT APPLICATIONS
PROTECTING SENSITIVE DATA
What you will learn
- PeopleSoft Security Overview
- Roles
-
Portal Security, including content references,
homepages, and tiles - Dynamic Role Rules
- Security Aliases
- Data Masking
- Troubleshooting
- Users
- Permission Lists
- Query Security
- Definition security
- Page and Field Configurator
- Data Privacy Framework
- Metadata tables
Through this course, you will learn how to
- Create Users, Roles, and Permission Lists
- Assign content to Permission Lists
- Locate Permission Lists associated with Content References, Tiles, Dynamic Tiles, and Queries
- Lock queries and protect Pivot Grids through Definition Security
- Apply Role and Permission List aliases to overcome delivered hard-coded Role and Permission List names
- Implement the Data Privacy Framework to protect sensitive data
- Automate provisioning through Dynamic Role Rules
- Hide, mask, and disable field editing at the Role-level through Page and Field Configurator
- Write your own queries to troubleshoot security issues
WHO SHOULD ATTEND?
-
System Administrators
-
Security Administrators
-
Functional Business Analysts
-
Developers
Certificate
Each course includes a blockchain-enabled digital certificate of achievement to prove your participation in our online course. Since this is a digital certificate, you print it, add it to your LinkedIn profile, or share it on social media!
Duration
Students typically complete this material within 20 hours.
You will have access to the videos for 60 days after purchase and may keep the accompanying activity guide for life.
RECOMMENDED PREREQUISITES
Course curriculum
-
1
Introduction
- © Copyright
- 💡 Hints and Definitions
- How to use this course
-
2
1. Security Overview
- Chapter Overview
- Watch: PeopleSoft Architecture
- PeopleSoft Security
- PeopleSoft Security Architecture
- Watch: Permission Lists
- Permission Lists
- Watch: Roles
- Roles
- Watch: User Profiles
- User Profiles
- Watch: Cloning Security
- Cloning in PeopleSoft Security
- Security Design Considerations
- Summary
-
3
2. Common User Security Tasks
- Chapter Overview
- Watch: Activities Review
- Activity 2-1: Unlock user account
- Activity 2-2: Reset Password
- Activity 2-3: Manually Create a New User
- Activity 2-4: Cloning a User
- Activity 2-5: New PeopleTools User
- Activity 2-6: Create a Permission List
- Activity 2-7: Create a Role
- Activity 2-8: Common Access Queries
- Summary
-
4
3. Portal Security
- Chapter Overview
- Watch: Navigation Overview
- Navigational Overview
- Folders and Content References
- Making a Component Available to Users
- The Portal Registry – Behind the Scenes
- Folder Security
- Creating a Content Reference Hyperlink
- Navigational Artifacts and Security Management
- Activity 3-1: Reviewing CREF Security
- Watch: Tile Security
- Tile Security
- Activity 3-2: Tile Security
- Watch: Tile Security Review
- Watch: Creating Homepages
- Walkthrough 3-3: Creating Homepages
- Watch: Managing Portal Folder Security
- Walkthrough 3-4: Managing Folder Security
- Watch: Creating Navigation Collections
- Walkthrough 3-5: Creating Navigation Collections
- Watch: Tile Wizard
- Walkthrough 3-6: Tile Wizard
- Activity 3-7: Create and Publish your own Navigation Collection
- Watch: Publish a Classic Content Reference as a Tile
- Walkthrough 3-8: Publish a Classic Content Reference as a Tile
- Walkthrough 3-9: Add Tiles to a Homepage
- Watch: Portal Security Tables
- Summary
- Watch: Portal Security Review
-
5
4. Query Security
- Chapter Overview
- Introduction
- Watch: Query Security
- Query Security
- Granting Access to Query Manager/Query Viewer
- Defining a Query Profile
- Granting Access Group Permissions
- Query Access Manager – Maintaining Query Trees
- Watch: Pivot Grid Security
- Walkthrough 4-1: A Pivot Grid Query Scenario (Financials/Supply Chain)
- Watch: Query Security Review
- Other Security Considerations
- Summary
-
6
5. Dynamic Role Rules
- Chapter Overview
- About Dynamic Role Rules
- Watch: The Dynamic Role Rule Query
- Walkthrough 5-1: Creating a Role Query
- Watch: Dynamic Role Rule System Setup
- Walkthrough 5-2: Dynamic Role Rule System Setup
- Watch: Applying a Dynamic Role Rule
- Walkthrough 5-3: Applying a Dynamic Role Rule
- Summary
-
7
6. Definition Security
- Chapter Overview
- About Definition Security
- Watch: Definition Security
- Walkthrough 6-1: Definition Security
- Walkthrough 6-2: Read-only Definition Security
- Summary
-
8
7. Role and Permission List Aliases
- Chapter Overview
- The Delivered Role Problem
- Walkthrough 7-1: Configuring Aliases
- Summary
-
9
8. Field-level Security
- Watch: Page and Field Configurator
- Walkthrough 8-1: Hiding a Field
- Activity 8-2: Hide the Currency Code
- Walkthrough 8-3: Criteria
- Watch: User Lists
- Walkthrough 8-4: User Lists
- Walkthrough 8-5: Sequencing Criteria
- Watch: Hiding the National Identifier
- Activity 8-6: Hiding the National Identifier
- Watch: Data Masking
- Walkthrough 8-7: Data Masking
- Watch: Event Mapping Field Masking
-
10
9. Data Privacy Framework
- Understanding the Data Privacy Framework
- Watch: Data Privacy Framework
- Watch: Query Data Masking
- Steps to Configure
- Relevant PeopleBooks Entries
- Walkthrough 9-1: Using the Data Privacy Framework
-
11
10. Security Tables
- Chapter Overview
- Security Tables
- Summary
-
12
11. Miscellaneous Security Features
- Watch: Pluggable Encryption Technology
- Watch: Signon PeopleCode
- Watch: Other Security Considerations
- Other Security Considerations
-
13
12. Next Steps
- Course Survey