PeopleSoft HCM Security Overview Training

PeopleSoft HCM Security Overview Training


PeopleSoft HCM Security Overview Training Course Description

This PeopleSoft HCM Security Overview training will teach you basics of application security and reporting security. It focuses on setting up and maintaining data permission security using the many available options.

This PeopleSoft HCM Security Overview Training course will be conducted in Seminar format for the LVC format. The instructor will demo all activities, students will not have hands on access to an environment. If you prefer hands on please consider the TOD.

S PeopleSoft HCM Security Overview TrainingRelated Courses:

Duration: 1 days

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience / Target Group:

Application Developers
Security Administrators
System Analysts

What You Will Learn:

Describe the four security layers of the PeopleSoft system.
Set up and use application security.
Work with HRMS Data Security.
Implement HRMS data security.
Assign data permission.
Maintain data permission.
Set up security for group build and global functionality.
Set up reporting security.

Skills Gained:

Create roles
Create permission lists
Create user profiles
Enter transaction and user security data
Set up data permission by security tree
Set up data permission by role
Manage data permission for recruiting
Create data permission for managers
Manage group security
Assign global security
Explain reporting security

Course Content:

Setting Up and Using Application Security

Explaining How Security Access Is Assigned to System Users
Using Permission Lists to Grant Security Access
Using Roles to Grant Security Access
Using User Profiles
Creating and Locking User Profiles by Groups

Working with HRMS Data Security

Describing HRMS Data
Describing Security Data
Describing Transaction Security Data
Entering Transaction Security Data
Entering User Security Data
Describing Security Join Tables
Describing the Data Permission Security Setup Process

Implementing HRMS Data Security

Describing the Data Permission Security Implementation Process
Selecting Data Permission Security Installation Settings
Reviewing Security Sets
Enabling Security Access Types

Assigning Data Permission

Describing the Assign Data Permission Process
Describing Row Security Permission Lists and Role-Based Permission Lists
Setting Up Data Permission by Department Security Tree
Assigning Tree-Based Data Permission to Row Security Permission Lists
Assigning Row Security Permission Lists to Users
Setting Up Data Permission by Role
Assigning Role-Based Permission Lists to Users

Maintaining Data Permission

Refreshing the User Security Join Tables
Refreshing the Transaction Security Join Tables
Creating Data Permission for Managers
Managing Data Permission for Recruiting

Setting Up Security for Group Build and Global Functionality

Managing Group Security
Assigning Global Security

Setting Up Reporting Security

Describing Query Security
Defining Query Access Groups
Explaining Query Data Permission

Request More Information

Time Frame: 0-3 Months4-12 Months

Print Friendly, PDF & Email