PeopleSoft HCM Security Overview Training
PeopleSoft HCM Security Overview Training Course Description
This PeopleSoft HCM Security Overview training will teach you basics of application security and reporting security. It focuses on setting up and maintaining data permission security using the many available options.
This PeopleSoft HCM Security Overview Training course will be conducted in Seminar format for the LVC format. The instructor will demo all activities, students will not have hands on access to an environment. If you prefer hands on please consider the TOD.
Duration: 1 days
With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.
Audience / Target Group:
What You Will Learn:
Describe the four security layers of the PeopleSoft system.
Set up and use application security.
Work with HRMS Data Security.
Implement HRMS data security.
Assign data permission.
Maintain data permission.
Set up security for group build and global functionality.
Set up reporting security.
Create permission lists
Create user profiles
Enter transaction and user security data
Set up data permission by security tree
Set up data permission by role
Manage data permission for recruiting
Create data permission for managers
Manage group security
Assign global security
Explain reporting security
Setting Up and Using Application Security
Explaining How Security Access Is Assigned to System Users
Using Permission Lists to Grant Security Access
Using Roles to Grant Security Access
Using User Profiles
Creating and Locking User Profiles by Groups
Working with HRMS Data Security
Describing HRMS Data
Describing Security Data
Describing Transaction Security Data
Entering Transaction Security Data
Entering User Security Data
Describing Security Join Tables
Describing the Data Permission Security Setup Process
Implementing HRMS Data Security
Describing the Data Permission Security Implementation Process
Selecting Data Permission Security Installation Settings
Reviewing Security Sets
Enabling Security Access Types
Assigning Data Permission
Describing the Assign Data Permission Process
Describing Row Security Permission Lists and Role-Based Permission Lists
Setting Up Data Permission by Department Security Tree
Assigning Tree-Based Data Permission to Row Security Permission Lists
Assigning Row Security Permission Lists to Users
Setting Up Data Permission by Role
Assigning Role-Based Permission Lists to Users
Maintaining Data Permission
Refreshing the User Security Join Tables
Refreshing the Transaction Security Join Tables
Creating Data Permission for Managers
Managing Data Permission for Recruiting
Setting Up Security for Group Build and Global Functionality
Managing Group Security
Assigning Global Security
Setting Up Reporting Security
Describing Query Security
Defining Query Access Groups
Explaining Query Data Permission
Request More Information