PeopleTools 8.51 PeopleBook: Security Administration

Transcription

PeopleTools 8.51 PeopleBook:Security AdministrationAugust 2010

PeopleTools 8.51 PeopleBook: Security AdministrationSKU pt8.51tsec-b0810Copyright 1988, 2010, Oracle and/or its affiliates. All rights reserved.Trademark NoticeOracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of theirrespective owners.License Restrictions Warranty/Consequential Damages DisclaimerThis software and related documentation are provided under a license agreement containing restrictions on use anddisclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement orallowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit,perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilationof this software, unless required by law for interoperability, is prohibited.Warranty DisclaimerThe information contained herein is subject to change without notice and is not warranted to be error-free. If you findany errors, please report them to us in writing.Restricted Rights NoticeIf this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S.Government, the following notice is applicable:U.S. GOVERNMENT RIGHTSPrograms, software, databases, and related documentation and technical data delivered to U.S. Governmentcustomers are "commercial computer software" or "commercial technical data" pursuant to the applicableFederal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication,disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in theapplicable Government contract, and, to the extent applicable by the terms of the Government contract, theadditional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065.Hazardous Applications NoticeThis software is developed for general use in a variety of information management applications. It is not developed orintended for use in any inherently dangerous applications, including applications which may create a risk of personalinjury. If you use this software in dangerous applications, then you shall be responsible to take all appropriate fail-safe,backup, redundancy and other measures to ensure the safe use of this software. Oracle Corporation and its affiliatesdisclaim any liability for any damages caused by use of this software in dangerous applications.Third Party Content, Products, and Services DisclaimerThis software and documentation may provide access to or information on content, products and services from thirdparties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kindwith respect to third party content, products and services. Oracle Corporation and its affiliates will not be responsible forany loss, costs, or damages incurred due to your access to or use of third party content, products or services.

ContentsPrefaceSecurity Administration Preface . xiiiSecurity Administration . xiiiPeopleBooks and the PeopleSoft Online Library . xiiiChapter 1Getting Started with Security Administration . 1Security Administration Overview . 1User Security . 1LDAP . 2Authentication and Single Signon . 2Data Encryption . 3Query and Definition Security . 4PeopleSoft Personalizations . 4Security Administration Integration Points . 4Component Interfaces . 5Service Operations . 6Application Engine Programs . 7Security Administration Implementation . 8Preparing to Use PeopleSoft Security . 9Administering Security from Applications . 9Reviewing and Monitoring Your Security Implementation . 10Chapter 2Understanding PeopleSoft Security . 13Security Basics .PeopleSoft Online Security .Sign in and Time-out Security .Page and Dialog Box Security .Batch Environment Security .Definition Security .Application Data Security .PeopleSoft Internet Architecture Security .Copyright 1988, 2010, Oracle and/or its affiliates. All Rights Reserved.1315151616171718iii

ContentsPeopleSoft Authorization IDs .User IDs .Connect ID .Access IDs .Symbolic IDs .Administrator Access .PeopleSoft Sign In .PeopleSoft Sign In Process .Directory Server Integration .Authentication and Signon PeopleCode .Single Signon .Implementation Options .Authentication Options .Role Assignment Options .Cross-System Synchronization Options .192020202121222223232424242526Chapter 3Setting Up Permission Lists . 27Understanding Permission Lists .Managing Permission Lists .Creating New Permission Lists .Copying Permission Lists .Deleting Permission Lists .Viewing Related Content References .Defining Permissions .Pages Used to Define Permission Lists .Setting General Permissions .Setting Page Permissions .Setting PeopleTools Permissions .Setting Process Permissions .Setting Sign-on Time Permissions .Setting Component Interface Permissions .Setting Web Library Permissions .Setting Web Services Permissions .Setting Personalization Permissions .Setting Query Permissions .Setting Mass Change Permissions .Displaying Additional Links .Viewing When a Permission List Was Last Updated .Running Permission List Queries yright 1988, 2010, Oracle and/or its affiliates. All Rights Reserved.

ContentsChapter 4Setting Up Roles . 71Understanding Roles .Managing Roles .Copying Roles .Deleting Roles .Removing Users From Roles .Defining Role Options .

PeopleSoft Online Security . 15 Sign in and Time-outSecurity . 15 Page and Dialog Box Security . 16File Size: 2MBPage Count: 354