Oracle PeopleSoft Security Rel 8.53

This PeopleSoft Security Rel 8.53 training teaches you to design and implemention of PeopleTools security. Learn the steps needed to effectively organize, implement, administer and evaluate PeopleSoft security.

Retail Price: $3,908.00

Next Date: Request Date

Course Days: 4


Request a Date

Request Custom Course


Learn To:

  • Secure PeopleSoft applications by creating permission lists, roles and user profiles.
  • Control access and authorization to client-based and browser-based PeopleTools.
  • Monitor database tables using three types of auditing.
  • Use PeopleSoft Encryption Technology to control data privacy, integrity and authentication.
  • Import digital certificates into database and Java keystores.
  • Secure queries, batch processes, and reports.
  • Maintain portal registry security.
  • Configure single sign-on among PeopleSoft applications.
  • Configure PeopleSoft applications to use directory servers to authenticate PeopleSoft users.

 

Skills Gained

  • Implement application and PeopleTools security.
  • Implement security for batch processing and reporting.
  • Administer portal and signon security.
  • Maintain security definitions among multiple databases.
  • Administer PeopleSoft security by using a directory.
  • Describe security design and administration in PeopleSoft Internet Architecture

Who Can Benefit

  • Administrator
  • Implementer

Course Outline

Topics

 

  • Describing Information Security
    • Discussing Information Security
    • Listing Security Levels
    • Designing and Implementing PeopleSoft Security
  • Working with Permission Lists
    • Describing Application Security
    • Creating Permission Lists
    • Copying Permission Lists
    • Deleting Permission Lists
  • Working with Roles
    • Creating Roles
    • Copying Roles
    • Deleting Roles
  • Working with User Profiles
    • Creating User Profiles
    • Copying User Profiles
  • Managing Advanced Application Security
    • Defining User Profile Types
    • Deleting User Profile Data
    • Configuring Distributed User Profile Assignment
    • Configuring Dynamic Role Assignment
  • Auditing Security Tables
    • Configuring Field Audits
    • Configuring Record Audits
    • Configuring Database-Level Audits
  • Managing PeopleTools Security
    • Securing Client-Based PeopleTools
    • Managing Definition Security
    • Implementing Change Control
  • Encrypting Data
    • Describing Data Encryption
    • Describing Pluggable Cryptography
    • Viewing Algorithm Chains and Key-sets
    • Defining Encryption Profiles
    • Attaching Encryption PeopleCode
  • Using Digital Certificates
    • Describing Public Key Infrastructure
    • Describing Digital Certificates
    • Obtaining Digital Certificates
    • Importing Digital Certificates
    • Requesting and Importing Digital Certificates into the Database Keystore
    • Requesting and Importing Digital Certificates into the Java Keystore
  • Securing Processes
    • Describing Process Security
    • Granting Access to Components
    • Securing Process Definitions
    • Securing Process Groups
    • Configuring Process Profile Permissions
    • Using Reporting Console
  • Administering Query Security
    • Creating Query Profiles
    • Creating Query Access Groups
    • Implementing Query Row-Level Security
  • Maintaining Portal Registry Security
    • Describing Portal Registry Security
    • Working with Portal Registry Security
    • Viewing Security Details
  • Administering Sign-on Security
    • Describing PeopleSoft Authorization IDs
    • Explaining the Sign-on Process
    • Configuring Password Controls
    • Setting Up Expired Password Controls
    • Setting Up Forgotten Password Options
  • Configuring Single Signon
    • Describing Single Signon
    • Defining Nodes for Single Signon
    • Configuring Trusted Nodes
  • Maintaining security definitions among multiple database
    • Transferring security definitions between databases
    • Synchronizing user profile data among databases
    • Configuring user profile synchronization.
    • Implementing configurable user profile synchronization.
  • Configuring PeopleSoft Applications for Directory Authentication
    • Describing Directories
    • Explaining Directory Authentication
    • Configuring Directory Authentication
    • Assigning PeopleSoft Roles Using Directory Groups
  • Course Review
    • Describing Security Design and Administration in PeopleSoft Internet Architecture.
    • Implementing Application and PeopleTools Security
    • Implementing Security for Batch Processing and Reporting
    • Administering Portal and Signon Security
    • Administering PeopleSoft Security by Using a Directory
  • Discussing Information Security
  • Listing Security Levels
  • Designing and Implementing PeopleSoft Security

Working with Permission Lists

  • Describing Application Security
  • Creating Permission Lists
  • Copying Permission Lists
  • Deleting Permission Lists

Working with Roles

  • Creating Roles
  • Copying Roles
  • Deleting Roles

Working with User Profiles

  • Creating User Profiles
  • Copying User Profiles

Managing Advanced Application Security

  • Defining User Profile Types
  • Deleting User Profile Data
  • Configuring Distributed User Profile Assignment
  • Configuring Dynamic Role Assignment

Auditing Security Tables

  • Configuring Field Audits
  • Configuring Record Audits
  • Configuring Database-Level Audits

Managing PeopleTools Security

  • Securing Client-Based PeopleTools
  • Managing Definition Security
  • Implementing Change Control

Encrypting Data

  • Describing Data Encryption
  • Describing Pluggable Cryptography
  • Viewing Algorithm Chains and Key-sets
  • Defining Encryption Profiles
  • Attaching Encryption PeopleCode

Using Digital Certificates

  • Describing Public Key Infrastructure
  • Describing Digital Certificates
  • Obtaining Digital Certificates
  • Importing Digital Certificates
  • Requesting and Importing Digital Certificates into the Database Keystore
  • Requesting and Importing Digital Certificates into the Java Keystore

Securing Processes

  • Describing Process Security
  • Granting Access to Components
  • Securing Process Definitions
  • Securing Process Groups
  • Configuring Process Profile Permissions
  • Using Reporting Console

Administering Query Security

  • Creating Query Profiles
  • Creating Query Access Groups
  • Implementing Query Row-Level Security

Maintaining Portal Registry Security

  • Describing Portal Registry Security
  • Working with Portal Registry Security
  • Viewing Security Details

Administering Sign-on Security

  • Describing PeopleSoft Authorization IDs
  • Explaining the Sign-on Process
  • Configuring Password Controls
  • Setting Up Expired Password Controls
  • Setting Up Forgotten Password Options

Configuring Single Signon

  • Describing Single Signon
  • Defining Nodes for Single Signon
  • Configuring Trusted Nodes

Maintaining security definitions among multiple database

  • Transferring security definitions between databases
  • Synchronizing user profile data among databases
  • Configuring user profile synchronization.
  • Implementing configurable user profile synchronization.

Configuring PeopleSoft Applications for Directory Authentication

  • Describing Directories
  • Explaining Directory Authentication
  • Configuring Directory Authentication
  • Assigning PeopleSoft Roles Using Directory Groups

Course Review

  • Describing Security Design and Administration in PeopleSoft Internet Architecture.
  • Implementing Application and PeopleTools Security
  • Implementing Security for Batch Processing and Reporting
  • Administering Portal and Signon Security
  • Administering PeopleSoft Security by Using a Directory


Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com


Request a Date