Product brief describes how GreyHeller's ERP Firewall provides powerful Delegate Access capabilities for Oracle PeopleSoft Higher Education customers.
Parent / Guardian Access provides a safe and controlled environment where a student can allow others to access different parts of the student’s information or to allow others to perform tasks such as paying bills on the student’s behalf.
This solution is an extension of the GreyHeller ERP Firewall. It provides fully-configurable access controls and auditing based on conditions such as location, content requested, role, device type, and data.
ERP Firewall is in full-scale production at many leading universities and corporations, controlling access to PeopleSoft.
Leave Management System
Software Requirements Specification Document
This module is a single leave management system that is critical for HR tasks and keeps the record of vital information regarding working hours and leaves. It intelligently adapts to HR policy of the management and allows employees and their line managers to manage leaves and replacements (if required). In this module, Head of Department (HOD) will have permissions to look after data of every faculty member of their department. HOD can approve leave through this application and can view leave information of every individual.
Leave Management System software helps the human resource to introduce leaves policies that work in favor of the employees. With flexibility and reliability, managers can track the leave patterns too with the help of analysis report.
The implications of access to inappropriate content are all very real and have led parents to demand effective and easily-deployed parental control solutions. Parents need tools through which they can control their children’s Internet usage – on smartphones, Tablets or PCs – while allowing them to provide equitable breath of usage.
Read more about our parental control solution: http://www.allot.com/parental-control.html
Leave Management System
Software Requirements Specification Document
This module is a single leave management system that is critical for HR tasks and keeps the record of vital information regarding working hours and leaves. It intelligently adapts to HR policy of the management and allows employees and their line managers to manage leaves and replacements (if required). In this module, Head of Department (HOD) will have permissions to look after data of every faculty member of their department. HOD can approve leave through this application and can view leave information of every individual.
Leave Management System software helps the human resource to introduce leaves policies that work in favor of the employees. With flexibility and reliability, managers can track the leave patterns too with the help of analysis report.
The implications of access to inappropriate content are all very real and have led parents to demand effective and easily-deployed parental control solutions. Parents need tools through which they can control their children’s Internet usage – on smartphones, Tablets or PCs – while allowing them to provide equitable breath of usage.
Read more about our parental control solution: http://www.allot.com/parental-control.html
Document Management System or Digital Folder.pptxBIS Safety
You can easily upload a plethora of policies, procedures, digital forms, documents, and files to a secure online storage location for your team using BIS Safety Software's Digital Folders.
You can also restrict who has access to the materials and who needs to sign off on them.
For more information about this software, visit our website.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
Evaluation of Library Automation software ppt.pptxlisbala
The selection of a good and perfect software package is not an easy job. A package which does not perform as expected or which requires expensive modifications will shake its creditability to the librarians to purchase them. A change of finding a right package could be improved by setting up an evaluation process based on common sense
Evaluation of Library Automation software ppt.pptxRbalasubramani
The selection of a good and perfect software package is not an easy job. A package which does not perform as expected or which requires expensive modifications will shake its creditability to the librarians to purchase them. A change of finding a right package could be improved by setting up an evaluation process based on common sense.
HP Data Protector is the first data backup solution in the entire industry to provide a uniform deduplication solution from the source to the target, and protect mission-critical data in virtual and physical environments. More than 45,000 customers worldwide trust their HP Data Protector solution to protect their most valuable asset—information.
This white paper provides recommendations for the implementation of a backup and recovery strategy for HP Data
Protector that allows you to optimize the way you use Data Protector in each IT environment. The guide concludes with
references to other sources of information related to Data Protector and a glossary of important terms.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Eu gdpr technical workflow and productionalization neccessary w privacy ass...Steven Meister
GDPR = General Data Protection Regulations or GDPR = Get Demand Payment Ready when your hacked or audited.
A Realistic project plan for GDPR Compliance. Another reality is the 95% not ready and even the 5% that say they are, will not like what they see in this plan in the hopes of becoming GDPR compliant.
There is just not enough time or people to get it done in the next 8 months and even if you had
2 years. This is a harsh reality and without the use of software technology and strict yet flexible, repeatable methodologies, it just won’t happen. Look at this Project plan of what needs to be done, do the math, see the complexity of data movement and code and programs needed then give us a call.
The objective of this workshop is to show existing Oracle Database (Enterprise
Edition, Exadata, Autonomous Database, EXACS, DBCS) customers how to
attach your Database to Data safe and gain valuable understanding of
potential risks. Using user Assessment, understand rights and entitlement of
users and review activity auditing which provides powerful insight to database
interaction. The workshop will finish with a full sensitive data discovery and
then how to anonymize date with sensitive data masking.
The workshop is delivered in an interactive way with Presentations and Hands on
Labs to ensure complete understanding.
How Logilab SDMS helps Laboratories to enable GLP Compliance - 4Agaram Technologies
GLP lays down a very important principle that the data captured or entered in the system
must be accurate. In order to ensure accuracy, GLP necessitates computerized system
must have the capability to validate, verify and filter the data for accuracy. Logilab SDMS
ensures that users can verify the data that is captured from the instruments can go through
a workflow process. Using the workflow tool users will be guided to follow the review and
approval processes so that data errors can be avoided.
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
The PHR is a tool that you can use to collect, track and share past and current information about your health or the health of someone
in your care. Personal health record (PHR) is considered as an emerging patient-centric model of health information exchange, where people can
share their health information to other people. Since there are wide privacy concerns about the health records and due to high operational cost,
users stored at a third party server called as Cloud Server. The issues such as risks of privacy exposure, scalability in key management, access
problem, user revocation, have remained the most important challenges towards achieving fine-grained, cryptographically enforced data access
control. In order to get rid off from this ,in this paper we introduce attribute-based encryption (ABE) techniques to encrypt each patient's PHR
file so that an unauthorised people won’t be able to view our PHR file.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
More Related Content
Similar to Delegate Access for Oracle PeopleSoft Higher Education Customers
Document Management System or Digital Folder.pptxBIS Safety
You can easily upload a plethora of policies, procedures, digital forms, documents, and files to a secure online storage location for your team using BIS Safety Software's Digital Folders.
You can also restrict who has access to the materials and who needs to sign off on them.
For more information about this software, visit our website.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
Evaluation of Library Automation software ppt.pptxlisbala
The selection of a good and perfect software package is not an easy job. A package which does not perform as expected or which requires expensive modifications will shake its creditability to the librarians to purchase them. A change of finding a right package could be improved by setting up an evaluation process based on common sense
Evaluation of Library Automation software ppt.pptxRbalasubramani
The selection of a good and perfect software package is not an easy job. A package which does not perform as expected or which requires expensive modifications will shake its creditability to the librarians to purchase them. A change of finding a right package could be improved by setting up an evaluation process based on common sense.
HP Data Protector is the first data backup solution in the entire industry to provide a uniform deduplication solution from the source to the target, and protect mission-critical data in virtual and physical environments. More than 45,000 customers worldwide trust their HP Data Protector solution to protect their most valuable asset—information.
This white paper provides recommendations for the implementation of a backup and recovery strategy for HP Data
Protector that allows you to optimize the way you use Data Protector in each IT environment. The guide concludes with
references to other sources of information related to Data Protector and a glossary of important terms.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Eu gdpr technical workflow and productionalization neccessary w privacy ass...Steven Meister
GDPR = General Data Protection Regulations or GDPR = Get Demand Payment Ready when your hacked or audited.
A Realistic project plan for GDPR Compliance. Another reality is the 95% not ready and even the 5% that say they are, will not like what they see in this plan in the hopes of becoming GDPR compliant.
There is just not enough time or people to get it done in the next 8 months and even if you had
2 years. This is a harsh reality and without the use of software technology and strict yet flexible, repeatable methodologies, it just won’t happen. Look at this Project plan of what needs to be done, do the math, see the complexity of data movement and code and programs needed then give us a call.
The objective of this workshop is to show existing Oracle Database (Enterprise
Edition, Exadata, Autonomous Database, EXACS, DBCS) customers how to
attach your Database to Data safe and gain valuable understanding of
potential risks. Using user Assessment, understand rights and entitlement of
users and review activity auditing which provides powerful insight to database
interaction. The workshop will finish with a full sensitive data discovery and
then how to anonymize date with sensitive data masking.
The workshop is delivered in an interactive way with Presentations and Hands on
Labs to ensure complete understanding.
How Logilab SDMS helps Laboratories to enable GLP Compliance - 4Agaram Technologies
GLP lays down a very important principle that the data captured or entered in the system
must be accurate. In order to ensure accuracy, GLP necessitates computerized system
must have the capability to validate, verify and filter the data for accuracy. Logilab SDMS
ensures that users can verify the data that is captured from the instruments can go through
a workflow process. Using the workflow tool users will be guided to follow the review and
approval processes so that data errors can be avoided.
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
The PHR is a tool that you can use to collect, track and share past and current information about your health or the health of someone
in your care. Personal health record (PHR) is considered as an emerging patient-centric model of health information exchange, where people can
share their health information to other people. Since there are wide privacy concerns about the health records and due to high operational cost,
users stored at a third party server called as Cloud Server. The issues such as risks of privacy exposure, scalability in key management, access
problem, user revocation, have remained the most important challenges towards achieving fine-grained, cryptographically enforced data access
control. In order to get rid off from this ,in this paper we introduce attribute-based encryption (ABE) techniques to encrypt each patient's PHR
file so that an unauthorised people won’t be able to view our PHR file.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 3
Introduction
This document describesthe key features of GreyHeller Parent / Guardian Access.
Parent / Guardian Access provides a safe and controlled environment where a
student can allow others to access different parts of the student’s information or to
allow others to perform tasks such as paying bills on the student’s behalf.
This solution is an extension of the GreyHeller ERP Firewall. It provides fully-
configurable access controls and auditing based on conditions such as location,
content requested, role, device type, and data. ERP Firewall is in full-scale
production at many leading universities and corporations that control access to
PeopleSoft.
Overview
Parent / Guardian Access includes components for 3 major roles of participation:
Administrative components to provide control over what content can be
exposed, how access is audited, and support capabilities.
Student components to allow the student to identify to whom access can
be granted, what functionality is exposed, and automated notification of
parents/ guardians of the access granted
Parent / Guardian components to allow the parent or guardian to access in
a controlled manner the student information in a manner that is easy to
understand.
4. ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 4
End-User Experience
This section covers the end-user experience for both the student and the parent or
guardian. Although the screenshots included in this document show desktop
access to these functions, PeopleMobile™ customers will have the ability to access
these screens from their mobile devices in a mobile-optimized format as well.
Student
The process begins with a student granting access to a parent or guardian. The
student navigates into the self-service menu to the Parent Guardian Delegation
options.
Upon accessing this page, the student has the ability to create IDs for the parent or
guardian to utilize for accessing the student’s data (note: this user id is not a
PeopleSoft Operator Definition to simplify administration and auditing). He/she
also has the ability to pick which areas the parent would be able to access. These
categories are fully configurable as part of the product’s configuration features, so
that your organization has control over what content is exposed as well as the
granularity by which the student can grant access to his/her information.
5. ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 5
Upon the creation the parent/guardian user id, the student has the ability to notify
the parent or guardian that he/she has been granted access to the student’s data,
how to access the system, and the credentials to be utilized.
Additional capabilities available to the student are the following:
Creating IDs and granting unique access to multiple individuals
Revoking or modifying access for the parent or guardian
Resetting the parent or guardian’s password
Viewing when the access was originally granted to the parent
6. ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 6
Parent / Guardian
Once the parent or guardian is granted access, he can utilize the navigation link and
credentials provided by the student. Although this is not required, we anticipate
that organizations utilizing this solution will want to provide a custom homepage
optimized for Parent/Guardian access that provides instructions, news, and other
information optimized for this different type of user.
7. ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 7
Upon successfully providing his/her credentials, the parent or guardian is provided
the navigation only to the components that the student granted. The system will
log all access and will apply any changes as if the parent were signed in as the
student (but with the controls applied).
8. ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 8
Administration
In order to maintain a lot total cost of ownership, we have put special focus on the
configuration and administrative capabilities of this solution.
Configuring the students’ choices
This solution gives you complete control over which content and the granularity of
selection you provide to your students as they grant access to parents or guardians.
This means that you can identify and categorize groupings of content as you see fit.
Each grouping is made available as a selectable option by the student for granting
access.
This is accomplished through the firewall conditions that are defined in the
product. The page used to identify this content is simple and intuitive to use, and
also provides features to make it easy to analyze access based on user id,
permission list, and role.
Setting the logging options
This solution includes powerful logging capabilities, allowing you the flexibility to
log the following:
Date/Time
Parent ID
Student who’s data being accessed (both Person ID and User ID)
Content requested
9. ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 9
Actions taken
Location by which access was made (requesting IP address or other
attribute)
You also have the ability to segregate logged data in any way you see fit. This may
include separating the logging of student financials from enrollment or other
functions to make it easier to analyze and audit system access for parents and/or
guardians.
Configuring the Parent / Guardian user experience
Parent / Guardian user experience can be configured using standard PeopleSoft
portal functionality. In general, we see our customers creating a Guest (or Parent /
Guardian) portal tab that is the landing page for Parents or Guardians. This portal
tab would be configured as follows
1. It is configured for guest access, so that the parent or guardian can learn
more about before logging in.
a. Boilerplate information about restrictions
b. News and other information targeted to parents or guardians
c. Schedule and calendar
d. Common links
e. Fundraising information
2. Upon logging in, the user is presented with a homepage that is optimized
for a logged-in user
a. Navigation collection with quick links to common functions
b. Pagelets optimized for displaying student content without
requiring additional navigation
Once the parent is logged in, the ERP Firewall will prune access based on the
privileges granted by the student.
Support Capabilities
This solution also provides a number of support capabilities, ensuring that it is easy
for the PeopleSoft team to administer and support the solution. These include the
following:
10. ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 10
Administrative access to all student functions, allowing an administrator to
reset the parent privileges on the students’ behalf.
Mass update capabilities, allowing an administrator to reset privileges for
groups of or all students.
Logging capabilities as configured in the product.