Audience :

  • Security Administrators
  • System Analysts
  • Application Developers
  • Administrator

Topics :

  • Technology Overview
    • PeopleSoft Security Layers
    • Data Permission Security
    • Finding More Information in PeopleBooks
  • Understanding PeopleSoft Security
    • Understanding Security Access Assignment to Users
    • Using Permission List Access
    • Using Roles to Grant Access
    • Using User Profiles
    • Creating and Locking User Profiles by Groups
  • HRMS Data Level Security
    • Understanding Data in HRMS
    • Security Data
    • Transaction Data
    • Transaction Security Data
    • Transaction Data Entry
    • Entering User Security Data
    • Understanding Security Join Tables
    • Data Permission Security Setup Process
  • Data Permission Assignments
    • Describing the Process of Data Permission Assignment
    • Row Security Permission List and Role Based Permission Lists
    • Data Permission Setup by Security Tree
    • Assigning Tree Based Data Permissions to Row Security Permission List
    • Row Security Permission List Assignment to Users
    • Data Permission by Role
    • Role Based Permission List Assignment to Users
  • Maintaining Data Permissions
    • User Security Join Table Refresh
    • Transaction Security Join Table Refresh
    • Creating Data Permissions for Managers
    • Managing Recruiting Data Permissions
  • Group Build and Global Functionality Security Setup
    • Managing Group Security
    • Global Functionality Security Setup
  • Reporting Security Setup
    • Understanding Query Security
    • Query Access Groups
    • Defining Query Access Groups
    • Understanding the Query Data Permission Process