11
SiS Technical Training Development Track Day 8

SiS Technical Training Development Track Day 8. Agenda Quick Overview of PeopleSoft Security Understand Permission Lists, Roles, User and Tree Security

Embed Size (px)

Citation preview

Page 1: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

SiS Technical Training Development Track

Day 8

Page 2: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

Agenda

Quick Overview of PeopleSoft Security

Understand Permission Lists, Roles, User and Tree Security

Quick Overview of PS Query and BI Publisher

Page 3: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

PeopleSoft Security

Overview:• Because deploying your applications to the internet significantly increases

the number of potential users your system must accommodate, you need an efficient method of granting authorization to different user types.

• PeopleSoft security definitions provide a modular means to apply security attributes in a scalable manner.

The three main PeopleSoft security definition types are:• User Profiles.• Roles.• Permission Lists.

Page 4: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

PeopleSoft Security

User Profiles:• User profiles define individual PeopleSoft users.• Each user has an individual user profile, which in turn is linked to one or more roles. You add one or more permission lists, which ultimately control what a user can and cannot access, to each role.

Roles:• Roles are intermediate objects that link user profiles to permission lists. You can assign multiple roles to a user profile, and you can assign multiple permission lists to a role.• Some examples of roles might be Employee, Manager, Customer, Vendor, and Student.

Page 5: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

PeopleSoft Security

Permission Lists:• Permission lists are groups of authorizations that you assign to roles.• Permission lists store sign-in times, page access, PeopleTools access etc.• There are some standard delivered permission lists which are to be included in the role.

Page 6: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

PeopleSoft Security

Page 7: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

PeopleSoft Security

Page 8: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

PeopleSoft Security

Page 9: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

PS Query and BI Publisher

PS Query:• PeopleSoft Query is an end user reporting tool. With PeopleSoft Query,

you can extract the precise information that you are looking for by using visual representations of your PeopleSoft database, without writing SQL statements.

• Users can design and run queries using any supported web browser.BI Publisher for PeopleSoft:• Oracle provides a standalone Java-based reporting technology named BI

Publisher (BIP) that streamlines report and form generation. • BIP provides the ability to design and create report layout templates with

the more common desktop applications of Microsoft Word and Adobe Acrobat, and renders XML data based on those templates.

• Can generate in PDF, RTF, Excel, HTML formats.

Page 10: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

PS Query and BI Publisher

Steps for Report Writing:• Make a query using the Query Manager.

Navigation: Reporting Tools> Query> Query Manager

• Create a Data Source of the newly generated Query.Navigation: Reporting Tools> BI Publisher> Data Source

• Create a new template for report and make a report definition.Navigation: Reporting Tools> BI Publisher> Report Definition

• Run and view the real time report.Navigation: Reporting Tools> BI Publisher> Query Report Viewer

Page 11: SiS Technical Training Development Track Day 8. Agenda  Quick Overview of PeopleSoft Security  Understand Permission Lists, Roles, User and Tree Security

Training Survey

Please provide your feedback at:http://goo.gl/WouW4C