Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
Download to read offline and view in fullscreen.



Download to read offline

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to like this


  1. 1. PS Security By Deviprasad
  2. 2. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules Using PS Query Assigning Roles LDAP Assigning Roles to PeopleCode View The Dynamic Members Conclusion Implementing security in ps
  3. 3. • Security is the degree of protection against danger, damage, loss, and crime. • In people soft we can implement security in 6 ways Sign on and Time-out ,Page and dialog ,Batch environment ,Definition, Application data, PIA
  4. 4. Components of PS Security • Three major building blocks used when defining your PeopleSoft security Permission Lists Roles User Profiles
  5. 5. Permission List • Lowest level of PeopleSoft security • It is a list of authorizations we assign to roles • Grants access to pages, People Tools, and sign-on times ,like application designer • Multiple Permission Lists can be assigned to a single role
  6. 6. Roles • Roles are assigned to User Profiles • Intermediate objects that link User Profiles to Permission Lists • Multiple roles can be assigned to a single User Profile • Roles can be assigned to User Profiles manually or dynamically
  7. 7. User Profiles • Defines the individual users of your PeopleSoft system • Information about the user such as e-mail address, language code, and password • User Profiles are linked to Roles to grant access to specific areas within the PeopleSoft application
  8. 8. • Creating User Profiles: -->Open the PS Sign On page. -->Click on People Tools. -->Click On security. -->Click on User Profiles. -->Click on user profiles. -->Click on Roles Tab. -->Click On + -->Select the Role Name and select it. -->Click on Save
  9. 9. • Creating Roles (Role is a collection of user profiles) -->Open the PS SignOn page. -->Click on People Tools. -->Click On security. -->Now Click on Roles -->Click on Add New Role. -->Select the Permission List (Ex:Devi) -->Click On save
  10. 10. Dynamic role rules • The assignment of roles to User Profiles based on your business rules • Business rule data can reside in a number of places: PeopleSoft data 3rd party systems LDAP • The dynamic role rule process removes and grants access to User Profiles
  11. 11. Methods - Assigning dynamic role rules • There are three technologies you can use to execute your business rules: • PS/Query • LDAP Plug-in • PeopleCode
  12. 12. Static role assignments • Roles are assigned to User Profiles manually • All security changes require manual intervention • High administration costs • High margin for human error
  13. 13. Building Role Rules - PS/Query • PeopleSoft recommends using PS/Query to build role rules if the membership data resides in your PeopleSoft database • Access is removed or granted based on the User Profile IDs retrieved by the query • Business rules can be built into the View and/or Query
  14. 14. Assigning Roles - LDAP LDAP is an Internet protocol used to access a directory listing. Organizations typically store user profiles in a central repository, or directory server, that serves user information for all of the programs that require it. Userid : It is an id we enter at PS sign on dialog box. It is stored with in an LDAP directory server
  15. 15. • A directory server enables the maintenance of centralized user profile that can be used across all of the PeopleSoft and non-PeopleSoft applications. This approach reduces redundant maintenance of user information stored separately throughout the enterprise, and reduces the possibility of user information getting out of synchronization. Also, enabling the user profiles to be easily created and maintained and authenticated.
  16. 16. Assigning Roles - PeopleCode • Membership data not contained within the PS database • Data might exist on other 3rd party systems • Extremely flexible – SQL Exec functions – Business Interlinks – Component Interfaces – IB- Integration Broker
  17. 17. • BI- Business Interlinks (call from PS to other application). Using this technology, we can use/call other application business logic from PS. • CI- Component Interface (Call from other application to PS) using this technology, other application can use/call PS business logic in the form of DLL.
  18. 18. • IB- Integration Broker - Peoplesoft's Hub. Heart of PIA. It's a middleware which is used to establish this connection between PS applications and 3rd party trade partners.In Architecture level,IB contains two major parts 1. Integration Gateway(in web server) 2. Integration Engine(in App server)
  19. 19. View the Dynamic Members • Dynamic members attached to the role can be viewed when looking at the role definition • Navigate to PeopleTools Maintain Security Use Roles • Click on the Dynamic Members tab
  20. 20. View the user profile
  21. 21. Summary • Define your business rules • Develop your dynamic roles based on the business rules defined by your organization • Three technologies used to develop dynamic roles • PS/Query • PeopleCode • LDAP
  22. 22. Implementing security in PS


Total views


On Slideshare


From embeds


Number of embeds