PeopleSoft - Course Details

PSHCMSO PeopleSoft HCM Security Overview

PeopleSoft Course Description:
This PeopleSoft HCM Security Overview training will teach you basics of application security and reporting security. It focuses on setting up and maintaining data permission security using the many available options.
PeopleSoft Course Duration:
1 Day Training
PeopleSoft Course Target Audience:
Administrator,Application Developers,Security Administrators,System Analysts
PeopleSoft Course Prerequisite:
NONE
Course Content:
Setting Up and Using Application Security
  • Explaining How Security Access Is Assigned to System Users
  • Using Permission Lists to Grant Security Access
  • Using Roles to Grant Security Access
  • Using User Profiles
  • Creating and Locking User Profiles by Groups
Working with HRMS Data Security
  • Describing HRMS Data
  • Describing Security Data
  • Describing Transaction Security Data
  • Entering Transaction Security Data
  • Entering User Security Data
  • Describing Security Join Tables
  • Describing the Data Permission Security Setup Process
Implementing HRMS Data Security
  • Describing the Data Permission Security Implementation Process
  • Selecting Data Permission Security Installation Settings
  • Reviewing Security Sets
  • Enabling Security Access Types
 
Assigning Data Permission
  • Describing the Assign Data Permission Process
  • Describing Row Security Permission Lists and Role-Based Permission Lists
  • Setting Up Data Permission by Department Security Tree
  • Assigning Tree-Based Data Permission to Row Security Permission Lists
  • Assigning Row Security Permission Lists to Users
  • Setting Up Data Permission by Role
  • Assigning Role-Based Permission Lists to Users
Maintaining Data Permission
  • Refreshing the User Security Join Tables
  • Refreshing the Transaction Security Join Tables
  • Creating Data Permission for Managers
  • Managing Data Permission for Recruiting
Setting Up Security for Group Build and Global Functionality
  • Managing Group Security
  • Assigning Global Security
Setting Up Reporting Security
  • Describing Query Security
  • Defining Query Access Groups
  • Explaining Query Data Permission