Here are the components of PeopleSoft Security
Three major building blocks used when defining your PeopleSoft security
– User Profiles
– Roles
– Permission Lists
User Profiles
• Define the individual users of your PeopleSoft system
• Set of data describing a particular user of your PeopleSoft system
• Information about the user such as e-mail address, language code, and password
• Assign process profiles, row-level security or business unit security at the User Profile level
• User Profiles are linked to Roles to grant access to specific areas within the PeopleSoft application
Roles
• Roles are assigned to User Profiles
• Intermediate objects that link User Profiles to Permission Lists
• Multiple roles can be assigned to a single User Profile
• Examples: Applicant, Employee, Vendor, Accounts Payable Clerk, and Manager
• Roles allow you to mix and match access to your PeopleSoft system
• Roles can be assigned to User Profiles manually or dynamically
Permission List
• Lowest level of PeopleSoft security
• Grants access to pages, PeopleTools, and sign-on times
• Assign actions such as Add, Update /Display, and Correction
• The fewer Permission Lists used, the more modular and scalable your PS security will be
• Multiple Permission Lists can be assigned to a single role
• Granularity allows you to “mix and match”
There are a lot more components involved with PeopleSoft security but these are the fundamentals..