Your SlideShare is downloading. ×
0
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Devi
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Devi

1,670

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,670
On Slideshare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. PS SecurityBy Deviprasad
  2. AgendaComponents of PS SecuritySecurity ModelUser ProfilesRolesPermission List.Dynamic RolesStatic RolesBuilding Roles/Rules Using PS QueryAssigning Roles LDAPAssigning Roles to PeopleCodeView The Dynamic MembersConclusionImplementing security in ps
  3. • Security is the degree of protection against danger, damage, loss, and crime.• In people soft we can implement security in 6 ways Sign on and Time-out ,Page and dialog ,Batch environment ,Definition, Application data, PIA
  4. Components of PS Security• Three major building blocks used when defining your PeopleSoft security Permission Lists Roles User Profiles
  5. Permission List• Lowest level of PeopleSoft security• It is a list of authorizations we assign to roles• Grants access to pages, People Tools, and sign-on times ,like application designer• Multiple Permission Lists can be assigned to a single role
  6. Roles• Roles are assigned to User Profiles• Intermediate objects that link User Profiles to Permission Lists• Multiple roles can be assigned to a single User Profile• Roles can be assigned to User Profiles manually or dynamically
  7. User Profiles• Defines the individual users of your PeopleSoft system• Information about the user such as e-mail address, language code, and password• User Profiles are linked to Roles to grant access to specific areas within the PeopleSoft application
  8. • Creating User Profiles: -->Open the PS Sign On page. -->Click on People Tools. -->Click On security. -->Click on User Profiles. -->Click on user profiles. -->Click on Roles Tab. -->Click On + -->Select the Role Name and select it. -->Click on Save
  9. • Creating Roles (Role is a collection of user profiles) -->Open the PS SignOn page. -->Click on People Tools. -->Click On security. -->Now Click on Roles -->Click on Add New Role. -->Select the Permission List (Ex:Devi) -->Click On save
  10. Dynamic role rules• The assignment of roles to User Profiles based on your business rules• Business rule data can reside in a number of places: PeopleSoft data 3rd party systems LDAP• The dynamic role rule process removes and grants access to User Profiles
  11. Methods - Assigning dynamicrole rules• There are three technologies you can use to execute your business rules:• PS/Query• LDAP Plug-in• PeopleCode
  12. Static role assignments• Roles are assigned to User Profiles manually• All security changes require manual intervention• High administration costs• High margin for human error
  13. Building Role Rules -PS/Query• PeopleSoft recommends using PS/Query to build role rules if the membership data resides in your PeopleSoft database• Access is removed or granted based on the User Profile IDs retrieved by the query• Business rules can be built into the View and/or Query
  14. Assigning Roles - LDAPLDAP is an Internet protocol used to access a directory listing. Organizations typically store user profiles in a central repository, or directory server, that serves user information for all of the programs that require it. Userid : It is an id we enter at PS sign on dialog box. It is stored with in an LDAP directory server
  15. • A directory server enables the maintenance of centralized user profile that can be used across all of the PeopleSoft and non-PeopleSoft applications. This approach reduces redundant maintenance of user information stored separately throughout the enterprise, and reduces the possibility of user information getting out of synchronization. Also, enabling the user profiles to be easily created and maintained and authenticated.
  16. Assigning Roles - PeopleCode• Membership data not contained within the PS database• Data might exist on other 3rd party systems• Extremely flexible – SQL Exec functions – Business Interlinks – Component Interfaces – IB- Integration Broker
  17. • BI- Business Interlinks (call from PS to other application). Using this technology, we can use/call other application business logic from PS.• CI- Component Interface (Call from other application to PS) using this technology, other application can use/call PS business logic in the form of DLL.
  18. • IB- Integration Broker - Peoplesofts Hub. Heart of PIA. Its a middleware which is used to establish this connection between PS applications and 3rd party trade partners.In Architecture level,IB contains two major parts 1. Integration Gateway(in web server) 2. Integration Engine(in App server)
  19. View the Dynamic Members• Dynamic members attached to the role can be viewed when looking at the role definition• Navigate to PeopleTools Maintain Security Use Roles• Click on the Dynamic Members tab
  20. View the user profile
  21. Summary• Define your business rules• Develop your dynamic roles based on the business rules defined by your organization• Three technologies used to develop dynamic roles• PS/Query• PeopleCode• LDAP
  22. Implementing security in PS

×