PeopleSoft Security v9.1 Training Manual

Similar documents
CHANCERY SMS 5.0 STUDENT SCHEDULING

Your School and You. Guide for Administrators

Houghton Mifflin Online Assessment System Walkthrough Guide

Home Access Center. Connecting Parents to Fulton County Schools

SECTION 12 E-Learning (CBT) Delivery Module

TA Certification Course Additional Information Sheet

Preferences...3 Basic Calculator...5 Math/Graphing Tools...5 Help...6 Run System Check...6 Sign Out...8

TotalLMS. Getting Started with SumTotal: Learner Mode

Nearing Completion of Prototype 1: Discovery

Parent s Guide to the Student/Parent Portal

SCT Banner Financial Aid Needs Analysis Training Workbook January 2005 Release 7

MOODLE 2.0 GLOSSARY TUTORIALS

EMPOWER Self-Service Portal Student User Manual

Once your credentials are accepted, you should get a pop-window (make sure that your browser is set to allow popups) that looks like this:

PeopleSoft Human Capital Management 9.2 (through Update Image 23) Hardware and Software Requirements

Connect Microbiology. Training Guide

Moodle Student User Guide

New Features & Functionality in Q Release Version 3.1 January 2016

Setting Up Tuition Controls, Criteria, Equations, and Waivers

Introduction to Moodle

Outreach Connect User Manual

U of S Course Tools. Open CourseWare (OCW)

Field Experience Management 2011 Training Guides

Training Catalogue for ACOs Global Learning Services V1.2. amadeus.com

Beginning Blackboard. Getting Started. The Control Panel. 1. Accessing Blackboard:

ecampus Basics Overview

New Features & Functionality in Q Release Version 3.2 June 2016

Appendix L: Online Testing Highlights and Script

Creating Your Term Schedule

TIPS PORTAL TRAINING DOCUMENTATION

PowerCampus Self-Service Student Guide. Release 8.4

FIS Learning Management System Activities

Test Administrator User Guide

Preparing for the School Census Autumn 2017 Return preparation guide. English Primary, Nursery and Special Phase Schools Applicable to 7.

EdX Learner s Guide. Release

Creating a Test in Eduphoria! Aware

Storytelling Made Simple

PowerTeacher Gradebook User Guide PowerSchool Student Information System

Managing the Student View of the Grade Center

SCT Banner Student Fee Assessment Training Workbook October 2005 Release 7.2

Netsmart Sandbox Tour Guide Script

Degree Audit Self-Service For Students 1

Welcome to California Colleges, Platform Exploration (6.1) Goal: Students will familiarize themselves with the CaliforniaColleges.edu platform.

On-Line Data Analytics

Using Blackboard.com Software to Reach Beyond the Classroom: Intermediate

TeacherPlus Gradebook HTML5 Guide LEARN OUR SOFTWARE STEP BY STEP

Student Handbook. This handbook was written for the students and participants of the MPI Training Site.

Intel-powered Classmate PC. SMART Response* Training Foils. Version 2.0

2 User Guide of Blackboard Mobile Learn for CityU Students (Android) How to download / install Bb Mobile Learn? Downloaded from Google Play Store

Android App Development for Beginners

School Year 2017/18. DDS MySped Application SPECIAL EDUCATION. Training Guide

Using SAM Central With iread

ACCESSING STUDENT ACCESS CENTER

Reviewing the student course evaluation request

Closing out the School Year for Teachers and Administrators Spring PANC Conference Wrightsville Beach April 7-9, 2014

Skyward Gradebook Online Assignments

Millersville University Degree Works Training User Guide

Blackboard Communication Tools

PEIMS Submission 1 list

All 11 th grade students attending public schools in Colorado will take the SAT. The SAT without essay is the default registration for all students.

Creating an Online Test. **This document was revised for the use of Plano ISD teachers and staff.

ACADEMIC TECHNOLOGY SUPPORT

TIMSS ADVANCED 2015 USER GUIDE FOR THE INTERNATIONAL DATABASE. Pierre Foy

Generating Test Cases From Use Cases

Attendance/ Data Clerk Manual.

The Enterprise Knowledge Portal: The Concept

Earthsoft s EQuIS Database Lower Duwamish Waterway Source Data Management

Automating Outcome Based Assessment

USER ADAPTATION IN E-LEARNING ENVIRONMENTS

Detailed Instructions to Create a Screen Name, Create a Group, and Join a Group

Student User s Guide to the Project Integration Management Simulation. Based on the PMBOK Guide - 5 th edition

Introduction to WeBWorK for Students

Specification of the Verity Learning Companion and Self-Assessment Tool

Spring 2015 IET4451 Systems Simulation Course Syllabus for Traditional, Hybrid, and Online Classes

WiggleWorks Software Manual PDF0049 (PDF) Houghton Mifflin Harcourt Publishing Company

Updated: 7/17/12. User Manual v. 2

Enhancing Customer Service through Learning Technology

Frequently Asked Questions Prior to Go-Live

Adult Degree Program. MyWPclasses (Moodle) Guide

M55205-Mastering Microsoft Project 2016

Examity - Adding Examity to your Moodle Course

NCAA Eligibility Center High School Portal Instructions. Course Module

COURSE LISTING. Courses Listed. Training for Cloud with SAP SuccessFactors in Integration. 23 November 2017 (08:13 GMT) Beginner.

Ericsson Wallet Platform (EWP) 3.0 Training Programs. Catalog of Course Descriptions

Schoology Getting Started Guide for Teachers

DegreeWorks Advisor Reference Guide

Donnelly Course Evaluation Process

Quick Start Guide 7.0

DO NOT DISCARD: TEACHER MANUAL

INFED. INFLIBNET Access Management Federation Yatrik Patel

Moodle 2 Assignments. LATTC Faculty Technology Training Tutorial

Principal Survey FAQs

An Industrial Technologist s Core Knowledge: Web-based Strategy for Defining Our Discipline

Feature-oriented vs. Needs-oriented Product Access for Non-Expert Online Shoppers

Course Groups and Coordinator Courses MyLab and Mastering for Blackboard Learn

Experience College- and Career-Ready Assessment User Guide

STUDENT MOODLE ORIENTATION

DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE. Junior Year. Summer (Bridge Quarter) Fall Winter Spring GAME Credits.

ESTABLISHING A TRAINING ACADEMY. Betsy Redfern MWH Americas, Inc. 380 Interlocken Crescent, Suite 200 Broomfield, CO

BLACKBOARD TRAINING PHASE 2 CREATE ASSESSMENT. Essential Tool Part 1 Rubrics, page 3-4. Assignment Tool Part 2 Assignments, page 5-10

Transcription:

PeopleSoft Security v9.1 Training Manual Peoplesoft Security v9.1 - Page 1 of 38 - SpearMC 2012

1.0 Course Introduction 1.1 Objective Developed specifically for PeopleSoft v9.1 Financials (FMS) functional end users, PeopleSoft Security v9.1 training quickly introduces students to the building blocks of PeopleSoft security. The goals of this class are achieved through a mixture of live PeopleSoft Security component walk-throughs and a handson exercise that allows students to apply security to a PeopleSoft FMS module as transactions are entered and processed. 1.2 Audience The target audience is Functional end-users and/or Functional Project Team members. Please note that this is not a comprehensive class geared for Developers or Security Administrators. 1.3 Prerequisite Intro to PeopleSoft v9.1 Financials Training 1.4 Duration Two Days 1.5 Instructor Background SpearMC Senior PeopleSoft Financials Consultant 1.6 Pre-class Items & Training Material SPEARMC Memo to Class and Expectations PeopleSoft Security Training Agenda PeopleSoft Security Training Manual o o o Technical: Not necessarily covered in this class good future reference for tech users Notes: Items of interest based on recent PeopleSoft v9.1 Security roll-outs Discussion Points: Specific SpearMC points to discuss topic being covered PeopleSoft Security Training Exercise PeopleSoft Security Process Flow Example PeopleSoft Security Strategy and Considerations Peoplesoft Security v9.1 - Page 2 of 38 - SpearMC 2012

2.0 Overview of PeopleSoft Security PeopleSoft security in v9.1 uses a role-based security model. This is considered a security leading practice as it allows the flexibility and robustness to maintain the integrity of the system and its data. The concept of decentralizing security is also supported in PeopleSoft, as it makes it more convenient for non-security administrators (e.g. super users, managers) to assign roles to end-users without exposing all security administration functionality. This course will cover the core components of PeopleSoft Security specifically geared towards non-security administrators. A security definition refers to a collection of related security attributes that are created using PeopleTools Security. The three main PeopleSoft security definition object types are: User Profiles, Roles and Permission Lists Each user of the system has an individual User Profile, which in turn is linked to one or more Roles. To each Role, you can add one or more Permission Lists, which ultimately control what a user can and can't access. So a user inherits permissions through the role. USER PROFILE - User ID - Password - Link to Employee ID (If applicable) - Account Lockout - User ID Alias (for LDAP, etc.) - Misc other User Profile Permission List (Data Permissions * ) ROLE - Contains multiple Permission Lists - Drives online workflow and automation - Dynamically maintained or static - Distributed maintenance option - Misc other Role PERMISSION LIST - Time Out - Allow password to be emailed - Page and Menu Access/Restriction - PeopleTools (Developer access) - Process Group and Process Profile - Sign-On Times - Components - Messages - Web Libraries - Personalizations - Query Access Groups and Query Profile - Mass Change - Row Level Security (Data Permissions) * - Misc other Permission List (Object Permissions) Peoplesoft Security v9.1 - Page 3 of 38 - SpearMC 2012

The panel below (Figure 1) shows the Base Navigation Page for PeopleSoft Security. Navigation: PeopleTools > Security Figure 1 Peoplesoft Security v9.1 - Page 4 of 38 - SpearMC 2012

2.1 User Profiles Overview A User Profile describes a particular user of the PeopleSoft system. This description includes everything from the low-level data that PeopleTools requires, such as Language Code, to application-specific data, such as the Table SetIDs a user is authorized to access within the PeopleSoft applications. User Profiles also maintain the Roles that are assigned to the user. Technical: User Profiles are different from the application data tables, such as PERSONAL_DATA, that also store information about people. User Profiles are relevant when a user interacts with the system by logging in, viewing a worklist entry, receiving an email, and so on. Application data tables are involved with the core application functionality, such as payroll processing and expense sheet processing, not with system-wide user interaction. 2.2 Roles Overview Roles are assigned to User Profiles. Roles are intermediate objects that link User Profiles to Permission Lists. Multiple Roles can be assigned to a User Profile, and you can assign multiple Permission Lists to a Role. Some examples of Roles might be Employee, Manager, Customer, and so on. A Manager is also an Employee. Roles enable us to mix and match access appropriately. Technical: There are two options when assigning roles; assign Roles manually or assigning them dynamically. When assigning roles dynamically, you can use PeopleCode, Light Directory Access Protocol (LDAP), and Query rules to assign User Profiles to Roles programmatically 2.3 Permission Lists Overview Permission Lists are lists, or groups, of authorizations that you assign to Roles. Permission Lists store Sign-on times, Page access, PeopleTools access, and so on. A Permission List may contain one or more types of permissions. The more types of permissions in a Permission List the more modular and scalable your implementation. A User Profile inherits most of its permissions through the roles that have been assigned to the User Profile. Data permissions, or row-level security, appear either through a Primary Permissions List or a Row Security Permissions list. Review / Q&A: How are the different agencies currently handling security? Start thinking about similarities and/or differences that currently exist vs. the PeopleSoft model. Peoplesoft Security v9.1 - Page 5 of 38 - SpearMC 2012

3.0 Permission Lists Permission Lists (Figure 2) are the building blocks of end user security authorizations. Before beginning to define User Profiles and Roles, you typically create our list of Permission Lists. When defining Permission Lists, consider each type of Role and User Profile to which they will be attached. Important to Note: PeopleSoft comes delivered with many pre-defined Permission Lists. SpearMC recommends that SpearMC make use of as many of these permission lists as possible. Figure 2 A Permission List may contain any number of the following permissions: (i) page permissions, (ii) signon times, (iii) process permissions, component interface permissions, and so on. Important to Note: You will focus primarily on Page Permissions and Process Permissions for this class. PeopleSoft Security is built off of the Permission List > Role > User Profile concept. Remember that a role may contain numerous permissions and a user profile may have numerous roles assigned to it. Peoplesoft Security v9.1 - Page 6 of 38 - SpearMC 2012

Because permission lists are applied to users through roles, a user inherits all the permissions assigned to each role to which the user belongs. The user's access is determined by the combination of all of the roles. Review / Q&A: Make sure you understand the concept of PeopleSoft Security. At a high-level think of Permission Lists as the component that allows a user what navigation is available to them and what process they can run. Theoretically, you can create a Permission List tailored for each and every Role, and that Permission List could contain a permission of every category from General to Libraries. Alternatively, you can use a more modular or "mix-and-match" approach. This approach involves numerous, specific Permission Lists that you can add and remove to Role definitions. As a general rule, permission lists should be assigned to roles so that the common user has in between 10 to 20 lists. Technical: When you set component permissions and your library permissions, there is a "View Content References" link that enables you to be able to view the content references pointing to a given component or script. PeopleTools automatically propagates changes to permission lists to the content references. When copying (cloning) a permission list, the content references associated with the copied permission list are also copied. Also, when deleting a permission list, the content references associated with that permission list are also removed. Hands-on: Select the PeopleSoft delivered role for Voucher Entry and Correction (Figure 3). Figure 3 Peoplesoft Security v9.1 - Page 7 of 38 - SpearMC 2012

3.1 Pages Used to Define Permission Lists Page Name Navigation Usage General PeopleTools, Security, Permission Lists and Roles, Permission Lists, General Set the general or miscellaneous attributes and system defaults. Note: Any General options will usually be set at a higher level default Permission List for all users. Pages PeopleTools, Security, Permission Lists and Roles, Permission Lists, Pages Set page permissions. PeopleTools Lists, PeopleTools Grant access to the standalone PeopleTools, like Application Designer, and grant access for specific operations within PeopleTools. Process Lists, Process Specify to what capacity a user, or Role, can modify certain Process Scheduler settings. Sign-on Times Lists, Sign-on Times Specify when users are authorized to sign on to the PeopleSoft system. Component Interface Lists, Component Interface Grant access to any Component Interfaces that a user may need to use to complete business transactions. Message Monitor Lists, Message Monitor Set permissions for administrators to monitor the messages and the components involved in the application messaging system. Your Libraries Lists, Your Libraries Set your library permissions. Personalizations Lists, Personalizations Enables to decide which personalizations users will be able to use and which ones they can customize. Query Lists, Query Control what query operations a user can perform and what data they can access while they are using Query. Mass Change Security Lists, Mass Change Set mass change security permissions. Audit Lists, Audit Inquire when a permission list was last updated and by whom. Peoplesoft Security v9.1 - Page 8 of 38 - SpearMC 2012

3.2 Setting General Permissions Description Navigator Homepage Can Start Application Server? Use to more uniquely identify the definition. There is a 30-character limit for this value. A graphic representation of a business process that is displayed by the PeopleSoft Navigator. For each security profile definition, you can specify a map to be displayed upon startup. If this is the user profile's Navigator Homepage permission list, the system gets this value at runtime. Selecting this check box enables a user profile with this permission to start a PeopleSoft application server. This may be a user ID used solely for starting the application server. At least one of the permission lists associated with the user ID used for starting the application server must have this permission selected. Allow Password to be Emailed? Time-Out Minutes When a user forgets their password, PeopleSoft provides the option to have it sent to the user through email. Time-out minutes are the number of minutes of inactivity allowed at a terminal before the system automatically signs the user off the PeopleSoft online system. Inactivity means: no mouse clicks, keystrokes, import, file print, or SQL activity. The default time-out minutes setting is Never Time-out. Peoplesoft Security v9.1 - Page 9 of 38 - SpearMC 2012

3.3 Setting Page Permissions Mobile Page Permissions Menu Name Menu Label Edit Components This link enables to grant access to your mobile application pages. Prompts against all of the menu names in the database. Add the desired menu names to the list. This reflects the definition name in PeopleSoft Application Designer. Shows the menu label associated with the PeopleSoft Application Designer menu name. Enables you to drill into the components and grant access of varying degrees to specific pages. Page permissions refer to the pages to which a user has access. Pages are contained within components, which are ultimately contained within a menu name. To grant access to a particular page, determine the component it is in and the menu name the component falls under. This enables you to drill down to the appropriate page in this interface beginning at the menu name level. Note: To find the name of a page, you can use CTRL+J feature while accessing the page with the browser, or use the Find Definition References feature in Application Designer After you add Menu Name, you grant access to its components and pages item on an item-by-item basis In PeopleSoft applications, menu items represent components. If a component consists of more than one page, then selecting the menu item opens another layer with more items individual pages. Review / Q&A: You recommend that SpearMC use or at least begin building Permission Lists based on what is delivered. Click Edit Components to see all the components involved in just one Permission List. Review / Q&A: Look at some of the other delivered PeopleSoft permission lists that deal with the AP module. Peoplesoft Security v9.1 - Page 10 of 38 - SpearMC 2012