EmpowHR EmpowHR Security Overview. 2 Application Security Administration Permission List Roles User Profiles Row level security Distributed Security Administration.

Slides:



Advertisements
Similar presentations
GALVESTON COUNTY, TX P-CARD TRAINING GALVESTON COUNTY.
Advertisements

PantherSoft Financials Smart Internal Billing. Agenda  Benefits  Security and User Roles  Definitions  Workflow  Defining/Modifying Items  Creating.
PeopleSoft FSCM 9.2 Reduce Indirect Spend and Procure to Pay Costs with PeopleSoft FSCM 9.2.
PantherSoft Financials 9.2 Fundamentals Office of the Controller
SESSION TWO SECURITY AND GROUP PERMISSIONS Security and Group Permissions.
IQSM Intelligent Quality Security Management Demonstration of features.
Workflow & Event Derivation Workshop
DigiTool User Architecture and Overview DigiTool Version 3.0.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
PeopleSoft: Campus Solutions Navigation and Configuration.
SiS Technical Training Development Track Day 7. Agenda  Understand Component Interface  Understand Excel to CI  Practice Data Loading using ECI (Instructor.
Workflow & Event Derivation Workshop
SiS Technical Training Development Track Technical Training(s) Day 1 – Day 2.
Agenda 22 7.SharePoint Changes 8.Items & Lists 9.Files & Libraries 10.SharePoint & Office 11.Help 12.Wrap Up.
EBO Overview Part 1 Ingrid Bongers MT(ASCP) MBA eClinicalWorks Certified Trainer.
1 System for Administration, Training, and Educational Resources for NASA Managing Access.
ClearPath Hosted MVP Web Portal 1. Log In Page Users are able to access the Web Portal by using their assigned user name and password. Access Web Browser.
Mandatory Annual ACE Training Fiscal Year 2011 – 2012.
Classroom User Training June 29, 2005 Presented by:
Security Management System for Department Sponsors Session #20244 March 15, 2006 Alliance 2006 Conference Nashville, Tennessee.
Mandatory Annual ACE Training Fiscal Year 2010 – 2011.
SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security.
Mandatory Annual ACE Training Fiscal Year 2012 – 2013.
Oracle Approvals Management (AME) Atlanta Oracle User Group January 18, 2008 Jon Moll.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Implementing GL, AP and PO Workflow
OneView Regional Administrator Mass ing Overview February, 2011.
Administrator – Employee Overview September, 2011.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
COMPONENT INTERFACE By, Mr. Srinivas.. What is Component Interface? A means to access the PeopleSoft application without using the PeopleSoft pages. It.
ENCOMPASS High Volume Process Instructor: –Gerri Williams 8/17/2011.
Module 3: Administrator Set-Up Intuit Financial Services University Internet Banking Certification Training.
1 Faculty Center for Instructors and Roster Contacts Accessing Faculty Center Class Roster Grade Roster Request Grade Changes Grade Approval Process Next.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Training by the Office of Library and Information Services Contact for more information: karen.gardner- or
Janice Chancey, Mgr Fin Info Sys & Reporting Controller’s Division / HS-B221 Phone: / Fax:
Roles 1. Your Role: End User End Users use Inside NCDOT and Connect NCDOT for basic browsing and reading Typical tasks can include: Open or download files.
USDA webTA Configuration Process United States Department of Agriculture Office of the Chief Financial Officer National Finance Center.
3 Copyright © 2004, Oracle. All rights reserved. Working in the Forms Developer Environment.
Master Data Management & Microsoft Master Data Services Presented By: Jeff Prom Data Architect MCTS - Business Intelligence (2008), Admin (2008), Developer.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
HR Information System Upgrade ONLINE ENGAGEMENT & ONBOARDING.
Staff Module and Summary of Changes 1. Icon Changes: Page 3 Signing In and Password/Pin Changes: Page 4 Logging Out: Page 8 Staff Module Changes: Page.
A user guide to accessing, reviewing and contributing to the Online Registry System.
©2013 JPMorgan Chase & Co. Proprietary and Confidential smartdata.gen2 Expense Report Training.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
Copyright © 2007, Oracle. All rights reserved. Implementing Role-Based Security.
DataDirector 3.0 Permissions Enhancements. Permissions - Overview  A new robust, user-friendly system of permissions has been implemented within DataDirector.
© 2014 IBM Corporation External Collaboration IBM Connections 5.0 Workshop IBM Ecosystem Development Duration: 30 minutes.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Responsible District and School Codes
PantherSoft Financials Smart Internal Billing
Agenda: New Hire & On-boarding
CollegeSource Security Application &
Working in the Forms Developer Environment
PeopleSoft 9.2.
PeopleSoft Financials Reports and Inquiry Training
Expense Report Training
Welcome to our first session!
PeopleSoft Financials Reports and Inquiry Training
Approve a Grant Proposal
(Required for DTCs, Recommended for STCs)
Gregory Smith November 2012
PantherSoft Financials 9.2 Fundamentals Office of the Controller
Using Employee Development in ADP Workforce Now
PeopleSoft 9.2.
Presentation transcript:

EmpowHR EmpowHR Security Overview

2 Application Security Administration Permission List Roles User Profiles Row level security Distributed Security Administration Agenda

3 Application Security An application security definition refers to a collection of related security attributes that you create using PeopleTools Security. The three main PeopleSoft security definition types are: Permission list Roles User Profiles

4 Permission List PeopleTools > Security > Permissions & Roles > Permission Lists Permission lists are the building blocks of user security authorizations. You typically create permission lists before you create user profiles and roles. Permission lists may contain any number of permissions such as page permission, peopleTools permission, and process permission

5 Defining Page Permissions Pages are contained within components, which are ultimately contained within a menu name Pages are contained within components, which are ultimately contained within a menu name Page permissions refer to the pages to which a user has access.

6 Defining CI Permissions Grant access to any component interfaces that a user may need to use to complete business transactions.

7 Defining Query Permissions Control the query operations a user can perform and the data a user can access while using PeopleSoft online Query

8 Roles PeopleTools > Security > Permissions & Roles > Roles Roles are an intermediate object that exist between permission lists and user profiles. It combines a set of permission lists into a meaningful collection. The View Definition link will display the permission list definitions.

9 Defining Role Options Members tab is used to view the current list of users assigned to the role.

10 Defining Role Options Options to enable PeopleSoft Workflow notification. Users can notify others of data on a PeopleSoft page through or worklists.

11 Defining User Profiles Permission lists are assigned to roles with the exception of the following, which are assigned directly to the user ID, Navigator Homepage, Process Profile, Primary Permission List, Row Security

12 Defining User Profiles Navigator Homepage: Associated with PeopleSoft Navigator maps Process Profile: Defines a user’s access for running batch processes through PeopleSoft Process Scheduler. For example, the process profile is where users are authorized to view output, update run locations, restart processes Primary: Defines a users organization default values such as Business Units, SetID and Company. Row Security: Defines a user’s access to the rows of data in the system

13 Defining User Profiles ID types and Attribute Name enable you to link user types with the records that are most relevant when a user interacts with the system. (i.e ESS/MSS)

14 User Profiles PeopleTools > Security > User Profiles > User Profiles User profiles define individual PeopleSoft users. You define user profiles and then link them to one or more roles.

15 Defining User Profiles Select an alternate role user to receive routings sent to this role user. Use this option when the role user is temporarily out (for example, on vacation or on leave).

16 The Audit page is a display-only page that enables you to determine: When a profile was last updated. Who updated the profile. Defining User Profiles

17 Understanding Row level security Row level security refers to controlling access to the rows of data in the system with security search views. It enables the system to ensure that users have access only to that which you have granted them access. This diagram shows how permission lists are created, assigned data permission, and assigned to users: User

18 Understanding Row level security The Permission List relationship to the Department Security Tree is what defines the Permission List as a Row-Security Permission List. SETIDs, associated DEPTIDs, and Access Codes are what set apart a Row-Security Permission List from a standard application Permission List. Navigation: Setup HRMS > Security > Department Security > Setup Security Access

19 Understanding the Department Security Tree A security tree is represents the organization's security hierarchy. Security trees enable you to grant / deny access to an employee's data by granting access to DEPTID to which they report. Navigation: Tree Manger > Tree Viewer

20  As the user population increases in size, it can become impractical for one person to centrally administer all of EmpowHR user profiles. You can distribute some or all user profile administration tasks by enabling selected users to use the Distributed User Profiles component. Currently this is only enabled in DHS.  The pages in the Distributed User Profiles component are identical to the corresponding pages in the User Profiles component, except that its User Roles page doesn’t include links for editing the assigned roles.  You can restrict who can use the component, which users they can administer, and what roles they can grant, based on the roles to which they themselves belong. Distributed Security Administration

21 Implementing Distributed Security Use permission lists and roles to configure security to give your selected remote security administrators access to the Distributed User Profiles component (USERMAINT_DIST).

22 Implementing Distributed Security Use the Role Grant page in the Roles component (ROLEMAINT) to specify which roles your remote security administrators can grant with the Distributed User Profiles component.

23 Implementing Distributed Security Navigation: PeopleTools > Security > User Profiles > Distributed Set Up Use the Set Distributed User Profile Search Record page to define a search record that returns only the user IDs that you want remote security administrators to be able to administer. The default search record is PSOPRDEFN_SRC. We defined our own search record to be more restrictive by Primary Permission list. (Z_PSOPRDEFN_SRC)

24 Administering Distributed User Profiles Navigate to: PeopleTools > Security > User Profiles > Distributed User Profiles Clicking the “Search” button will display only the User IDs within the Administrators own component. This is determined by the search record you specified on the Set Distributed User Profile Search Record page. Clicking the “Search” button will display only the User IDs within the Administrators own component. This is determined by the search record you specified on the Set Distributed User Profile Search Record page.

25 Administering Distributed User Profiles The roles that a given remote security administrator can grant are determined by the selections that you made on the Roles - Role Grant page.