PeopleSoft Security Training Rel 8.53

PeopleSoft Security Training Rel 8.53

Introduction:

PeopleSoft Security Training Rel 8.53 Course hands-on

This PeopleSoft Security Training Rel 8.53 teaches you to design and implemention of PeopleTools security. Learn the steps needed to effectively organize, implement, administer and evaluate PeopleSoft security.

PeopleSoft Security Training Rel 8.53Related Courses:

Duration: 4 days

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience / Target Group:

Security Administrators
Technical Administrator
Technical Consultant

Prerequisites:

Working knowledge of PeopleSoft Architecture.
Experience with the Eight Steps of Application Development.
Understanding of basic navigation and PeopleSoft concepts.
Understanding of your company's security requirements.

What You Will Learn:

Secure PeopleSoft applications by creating permission lists, roles and user profiles.
Control access and authorization to client-based and browser-based PeopleTools.
Monitor database tables using three types of auditing.
Use PeopleSoft Encryption Technology to control data privacy, integrity and authentication.
Import digital certificates into database and Java keystores.
Secure queries, batch processes, and reports.
Maintain portal registry security.
Configure single sign-on among PeopleSoft applications.
Configure PeopleSoft applications to use directory servers to authenticate PeopleSoft users.

Skills Gained:

Implement application and PeopleTools security.
Implement security for batch processing and reporting.
Administer portal and signon security.
Maintain security definitions among multiple databases.
Administer PeopleSoft security by using a directory.
Describe security design and administration in PeopleSoft Internet Architecture

Course Content:

Describing Information Security

Discussing Information Security
Listing Security Levels
Designing and Implementing PeopleSoft Security

Working with Permission Lists

Describing Application Security
Creating Permission Lists
Copying Permission Lists
Deleting Permission Lists

Working with Roles

Creating Roles
Copying Roles
Deleting Roles

Working with User Profiles

Creating User Profiles
Copying User Profiles

Managing Advanced Application Security

Defining User Profile Types
Deleting User Profile Data
Configuring Distributed User Profile Assignment
Configuring Dynamic Role Assignment

Auditing Security Tables

Configuring Field Audits
Configuring Record Audits
Configuring Database-Level Audits

Managing PeopleTools Security

Securing Client-Based PeopleTools
Managing Definition Security
Implementing Change Control

Encrypting Data

Describing Data Encryption
Describing Pluggable Cryptography
Viewing Algorithm Chains and Key-sets
Defining Encryption Profiles
Attaching Encryption PeopleCode

Using Digital Certificates

Describing Public Key Infrastructure
Describing Digital Certificates
Obtaining Digital Certificates
Importing Digital Certificates
Requesting and Importing Digital Certificates into the Database Keystore
Requesting and Importing Digital Certificates into the Java Keystore

Securing Processes

Describing Process Security
Granting Access to Components
Securing Process Definitions
Securing Process Groups
Configuring Process Profile Permissions
Using Reporting Console

Administering Query Security

Creating Query Profiles
Creating Query Access Groups
Implementing Query Row-Level Security

Maintaining Portal Registry Security

Describing Portal Registry Security
Working with Portal Registry Security
Viewing Security Details

Administering Sign-on Security

Describing PeopleSoft Authorization IDs
Explaining the Sign-on Process
Configuring Password Controls
Setting Up Expired Password Controls
Setting Up Forgotten Password Options

Configuring Single Signon

Describing Single Signon
Defining Nodes for Single Signon
Configuring Trusted Nodes

Maintaining security definitions among multiple database

Transferring security definitions between databases
Synchronizing user profile data among databases
Configuring user profile synchronization.
Implementing configurable user profile synchronization.

Configuring PeopleSoft Applications for Directory Authentication

Describing Directories
Explaining Directory Authentication
Configuring Directory Authentication
Assigning PeopleSoft Roles Using Directory Groups

Course Review

Describing Security Design and Administration in PeopleSoft Internet Architecture.
Implementing Application and PeopleTools Security
Implementing Security for Batch Processing and Reporting
Administering Portal and Signon Security
Administering PeopleSoft Security by Using a Directory

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment