PeopleSoft Security Training Rel 8.53
PeopleSoft Security Training Rel 8.53 Course hands-on
This PeopleSoft Security Training Rel 8.53 teaches you to design and implemention of PeopleTools security. Learn the steps needed to effectively organize, implement, administer and evaluate PeopleSoft security.
Duration: 4 days
With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.
Audience / Target Group:
Working knowledge of PeopleSoft Architecture.
Experience with the Eight Steps of Application Development.
Understanding of basic navigation and PeopleSoft concepts.
Understanding of your company's security requirements.
What You Will Learn:
Secure PeopleSoft applications by creating permission lists, roles and user profiles.
Control access and authorization to client-based and browser-based PeopleTools.
Monitor database tables using three types of auditing.
Use PeopleSoft Encryption Technology to control data privacy, integrity and authentication.
Import digital certificates into database and Java keystores.
Secure queries, batch processes, and reports.
Maintain portal registry security.
Configure single sign-on among PeopleSoft applications.
Configure PeopleSoft applications to use directory servers to authenticate PeopleSoft users.
Implement application and PeopleTools security.
Implement security for batch processing and reporting.
Administer portal and signon security.
Maintain security definitions among multiple databases.
Administer PeopleSoft security by using a directory.
Describe security design and administration in PeopleSoft Internet Architecture
Describing Information Security
Discussing Information Security
Listing Security Levels
Designing and Implementing PeopleSoft Security
Working with Permission Lists
Describing Application Security
Creating Permission Lists
Copying Permission Lists
Deleting Permission Lists
Working with Roles
Working with User Profiles
Creating User Profiles
Copying User Profiles
Managing Advanced Application Security
Defining User Profile Types
Deleting User Profile Data
Configuring Distributed User Profile Assignment
Configuring Dynamic Role Assignment
Auditing Security Tables
Configuring Field Audits
Configuring Record Audits
Configuring Database-Level Audits
Managing PeopleTools Security
Securing Client-Based PeopleTools
Managing Definition Security
Implementing Change Control
Describing Data Encryption
Describing Pluggable Cryptography
Viewing Algorithm Chains and Key-sets
Defining Encryption Profiles
Attaching Encryption PeopleCode
Using Digital Certificates
Describing Public Key Infrastructure
Describing Digital Certificates
Obtaining Digital Certificates
Importing Digital Certificates
Requesting and Importing Digital Certificates into the Database Keystore
Requesting and Importing Digital Certificates into the Java Keystore
Describing Process Security
Granting Access to Components
Securing Process Definitions
Securing Process Groups
Configuring Process Profile Permissions
Using Reporting Console
Administering Query Security
Creating Query Profiles
Creating Query Access Groups
Implementing Query Row-Level Security
Maintaining Portal Registry Security
Describing Portal Registry Security
Working with Portal Registry Security
Viewing Security Details
Administering Sign-on Security
Describing PeopleSoft Authorization IDs
Explaining the Sign-on Process
Configuring Password Controls
Setting Up Expired Password Controls
Setting Up Forgotten Password Options
Configuring Single Signon
Describing Single Signon
Defining Nodes for Single Signon
Configuring Trusted Nodes
Maintaining security definitions among multiple database
Transferring security definitions between databases
Synchronizing user profile data among databases
Configuring user profile synchronization.
Implementing configurable user profile synchronization.
Configuring PeopleSoft Applications for Directory Authentication
Explaining Directory Authentication
Configuring Directory Authentication
Assigning PeopleSoft Roles Using Directory Groups
Describing Security Design and Administration in PeopleSoft Internet Architecture.
Implementing Application and PeopleTools Security
Implementing Security for Batch Processing and Reporting
Administering Portal and Signon Security
Administering PeopleSoft Security by Using a Directory
Request More Information