PeopleSoft Security Rel 8.53

Course DateLocationDaysPriceRegister
Dec 11, 2017Toronto4 $4,840Register
Mar 12, 2018Toronto4 $4,840Register
May 14, 2018Toronto4 $4,840Register


Course DateLocationDaysPriceRegister
Nov 27, 2017Live Virtual - 10:00 am Eastern4 $4,640Register
Oct 17, 2017Live Virtual - 12:00 pm Eastern4 $4,640Register


Course DateLocationDaysPriceRegister
Self-Paced Learning4 $4,280Register


PeopleSoft Security Rel 8.53

Description: This PeopleSoft Security Rel 8.53 training teaches you to design and implemention of PeopleTools security. Learn the steps needed to effectively organize, implement, administer and evaluate PeopleSoft security.

Duration: 4 Days

Learn to:

  • Secure PeopleSoft applications by creating permission lists, roles and user profiles.
  • Control access and authorization to client-based and browser-based PeopleTools.
  • Monitor database tables using three types of auditing.
  • Use PeopleSoft Encryption Technology to control data privacy, integrity and authentication.
  • Import digital certificates into database and Java keystores.
  • Secure queries, batch processes, and reports.
  • Maintain portal registry security.
  • Configure single sign-on among PeopleSoft applications.
  • Configure PeopleSoft applications to use directory servers to authenticate PeopleSoft users.

Required Prerequisites:

  • Working knowledge of PeopleSoft Architecture.
  • Understanding of basic navigation and PeopleSoft concepts.

Suggested Prerequisites:

  • Experience with the Eight Steps of Application Development.
  • Understanding of your company's security requirements.

Audience:

  • Suggested Prerequisites:
  • Experience with the Eight Steps of Application Development.
  • Understanding of your company's security requirements.

Course Objectives:

  • Implement application and PeopleTools security.
  • Implement security for batch processing and reporting.
  • Administer portal and signon security.
  • Maintain security definitions among multiple databases.
  • Administer PeopleSoft security by using a directory.
  • Describe security design and administration in PeopleSoft Internet Architecture

Topics:

Describing Information Security

  • Discussing Information Security
  • Listing Security Levels
  • Designing and Implementing PeopleSoft Security

Working with Permission Lists

  • Describing Application Security
  • Creating Permission Lists
  • Copying Permission Lists
  • Deleting Permission Lists

Working with Roles

  • Creating Roles
  • Copying Roles
  • Deleting Roles

Working with User Profiles

  • Creating User Profiles
  • Copying User Profiles

Managing Advanced Application Security

  • Defining User Profile Types
  • Deleting User Profile Data
  • Configuring Distributed User Profile Assignment
  • Configuring Dynamic Role Assignment

Auditing Security Tables

  • Configuring Field Audits
  • Configuring Record Audits
  • Configuring Database-Level Audits

Managing PeopleTools Security

  • Securing Client-Based PeopleTools
  • Managing Definition Security
  • Implementing Change Control

Encrypting Data

  • Describing Data Encryption
  • Describing Pluggable Cryptography
  • Viewing Algorithm Chains and Key-sets
  • Defining Encryption Profiles
  • Attaching Encryption PeopleCode

Using Digital Certificates

  • Describing Public Key Infrastructure
  • Describing Digital Certificates
  • Obtaining Digital Certificates
  • Importing Digital Certificates
  • Requesting and Importing Digital Certificates into the Database Keystore
  • Requesting and Importing Digital Certificates into the Java Keystore

Securing Processes

  • Describing Process Security
  • Granting Access to Components
  • Securing Process Definitions
  • Securing Process Groups
  • Configuring Process Profile Permissions
  • Using Reporting Console

Administering Query Security

  • Creating Query Profiles
  • Creating Query Access Groups
  • Implementing Query Row-Level Security

Maintaining Portal Registry Security

  • Describing Portal Registry Security
  • Working with Portal Registry Security
  • Viewing Security Details

Administering Sign-on Security

  • Describing PeopleSoft Authorization IDs
  • Explaining the Sign-on Process
  • Configuring Password Controls
  • Setting Up Expired Password Controls
  • Setting Up Forgotten Password Options

Configuring Single Signon

  • Describing Single Signon
  • Defining Nodes for Single Signon
  • Configuring Trusted Nodes

Maintaining security definitions among multiple database

  • Transferring security definitions between databases
  • Synchronizing user profile data among databases
  • Configuring user profile synchronization.
  • Implementing configurable user profile synchronization.

Configuring PeopleSoft Applications for Directory Authentication

  • Describing Directories
  • Explaining Directory Authentication
  • Configuring Directory Authentication
  • Assigning PeopleSoft Roles Using Directory Groups

Course Review

  • Describing Security Design and Administration in PeopleSoft Internet Architecture.
  • Implementing Application and PeopleTools Security
  • Implementing Security for Batch Processing and Reporting
  • Administering Portal and Signon Security
  • Administering PeopleSoft Security by Using a Directory

 

Course DateLocationDaysPriceRegister
Dec 11, 2017Toronto4 $4,840Register
Mar 12, 2018Toronto4 $4,840Register
May 14, 2018Toronto4 $4,840Register


Course DateLocationDaysPriceRegister
Nov 27, 2017Live Virtual - 10:00 am Eastern4 $4,640Register
Oct 17, 2017Live Virtual - 12:00 pm Eastern4 $4,640Register


Course DateLocationDaysPriceRegister
Self-Paced Learning4 $4,280Register