没有合适的资源?快使用搜索试试~ 我知道了~
peoplesoft securty
需积分: 35 5 下载量 73 浏览量
2017-05-31
17:04:27
上传
评论
收藏 1.52MB PDF 举报
温馨提示
试读
100页
PeopleSoft 安全性
资源推荐
资源详情
资源评论
PeopleSoft Enterprise
Human Capital Management &
Campus Solutions:
Row Level Security in 8.9
Version 1.0
An Oracle White Paper
March 2005
PeopleSoft Enterprise Human Capital Management & Campus Solutions: Row Level Security in 8.9 Page 2
PeopleSoft Enterprise Human Capital Management &
Campus Solutions: Row Level Security in 8.9
Version 1.0
Introduction........................................................................................................ 5
Design..................................................................................................................5
What is Row Level Security? .......................................................................5
How is Row Level Security triggered? .......................................................6
Security Structure Terminology...................................................................6
Security Installation Settings........................................................................8
Special Job Security ..................................................................................9
Actions that trigger Future Dated Security Rows..............................10
Security Sets: Defining What data is being secured................................11
Security Set Table Page..........................................................................12
Head 3 ......................................................................................................12
Head 3 ......................................................................................................12
Security Update Groups Page ...................................................................13
Security Types: Defining How the data is secured..................................14
Security Type Table Page.......................................................................16
Security Type SQL Page........................................................................18
Assigning the Transaction Security Field Values to Security to
Permission Lists...........................................................................................18
Security by Department Tree................................................................18
Security by Permission List ...................................................................22
Use the Security by Permission List component for all security types
that are not based on a department security tree....................................22
Follow these steps to set up security by permission list:.......................22
Variations.................................................................................................25
How Security Views work..........................................................................27
Entity Relationship Diagrams ...................................................................30
Security Records..........................................................................................31
SCRTY_SET_TBL: Security Sets ........................................................31
SCRTY_TYPE_TBL: Security Types .................................................31
SJT_CLASS: Security data by Permission List (non-tree)...............35
SCRTY_TBL_DEPT: Security data by Permission List (tree).......35
SJT_CLASS_ALL: Security Join Table for the Operator Side.......36
SJT_PERSON: Security Join Table for People ................................38
SJT_DEPT: Security Join Table for Departments ............................40
PeopleSoft Enterprise Human Capital Management & Campus Solutions: Row Level Security in 8.9 Page 3
SJT_PERSON_USF: Security Join Table for USF Employees.......40
HRS_SJT_JO: Security Join Table for Recruiting Solutions Job
Openings..................................................................................................41
Core View Structure and View Text.........................................................41
Persons.....................................................................................................43
Enabling Different fields for the Search and List Box .....................47
Product specific views ................................................................................48
Custom Views..............................................................................................51
Refreshing the Operator Security Join Table..........................................51
Refreshing the Transaction Security Join Tables....................................52
Nightly Updates for the Transaction Security Join Tables....................55
Real-Time updates of the Transaction Security Join Tables.................56
SCRTY_SETTYP_VW .........................................................................56
SCRTY_DERIVED...............................................................................57
Process......................................................................................................57
Creating New Security Types.........................................................................60
Security for People without Jobs...................................................................71
Special Job Security Versions (aka Access by Association).......................73
Include Home/Host Access (aka International Security). ....................74
One Home – One Host.........................................................................75
Include Additional Assignment Security..................................................82
JOB Data .................................................................................................84
Include Japan Assignment Security ..........................................................86
Example of Security Access..................................................................87
Implementation Process .................................................................................91
Steps..............................................................................................................91
What Security Types to enable..................................................................91
What to consider .........................................................................................91
Enabling Multiple Types in a Set ..............................................................92
Security in Production.....................................................................................92
User Maintenance........................................................................................92
Permission List Maintenance.....................................................................92
Role Maintenance........................................................................................93
Department Tree Maintenance .................................................................93
Security Type Maintenance........................................................................93
Future dated entries in the Transactional Tables....................................94
Changes to the Transactional Tables via Batch......................................94
Upgrade Process ..............................................................................................94
Customers Using the Delivered Dept Security Tree..............................94
Customers Using the Delivered Dept Security Tree with Global or
Japan Additional Assignments Versions..................................................95
Customers Who Have Customizations to use the Business Unit,
Location, Regulatory Region, Company, or Salary Grade Fields instead
of DEPTID..................................................................................................95
Customers Who Have Customizations to use the DEPTID but not via
the Tree.........................................................................................................96
PeopleSoft Enterprise Human Capital Management & Campus Solutions: Row Level Security in 8.9 Page 4
Customers Who Are in One of the Above Categories but Have Also
Created Their Own Security Views ..........................................................97
Customers Who Have Customizations That Do Not Use a Field in the
JOB_DATA Components.........................................................................97
Customers Who Have Turned off Row Level Security.........................97
FAQ...................................................................................................................98
Can I set up Read-only access? .................................................................98
Does the new security Structure support Field Level security?............98
How does this affect Manager eApps and Direct Reports?..................99
Can I update the SJT tables after a batch update?..................................99
Can I use other Trees other than the Department Security Tree?.......99
Customization ..................................................................................................99
Adding a new Security Set..........................................................................99
PeopleSoft Enterprise Human Capital Management & Campus Solutions: Row Level Security in 8.9 Page 5
PeopleSoft Enterprise Human Capital Management &
Campus Solutions: Row Level Security in 8.9
Version 1.0
INTRODUCTION
Oracle’s PeopleSoft Enterprise HCM HRCS 8.9 provides enhancements to the
setup, usage, and flexibility of row level security. This document will explain these
improvements and discuss how you can use the new flexibility and offer tips to
help you implement and approach customizations.
The major enhancements to row level security for 8.9 are:
• The ability to secure more than just access to person data.
• The ability to use more than one-way of securing your data.
• Easier setup and changeability.
• Better performance and flexibility for refreshing security tables.
• Real-time updates to security tables.
• Easier setup of global and additional appointment security.
DESIGN
What is Row Level Security?
Row level security is a term used to describe the ability to prevent users from
accessing rows of data that they are not supposed to see. Security at the row level
restricts the user from accessing all of the data on a particular row. Row level
security is enforced through the use of a security view. A security view joins
together the user’s security definition with the data that is being secured and returns
only the rows that the user is allowed to access.
For example, the JOB_DATA component uses a search view that uses row level
security. When a user accesses the JOB_DATA component search page and
searches for a record, the security view only enables the search page to return those
rows the user has access to. So if the user has access to people in the department
ABC and searches for employees with the name of Smith, the security view only
lets employees with the name of Smith in department ABC be displayed on the
JOB_DATA search page.
Row level security is a term used to
describe the ability to prevent users from
accessing rows of data that they are not
supposed to see. Security at the row level
restricts the user from accessing all of the
data on a particular row.
剩余99页未读,继续阅读
资源评论
Game_Kimi_lee
- 粉丝: 1
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- python解决旅行商(TSP)问题.zip
- 大数据实践赛-计算机设计大赛(开发文档 + 答辩PPT)
- 基于布谷鸟算法优化BP神经网络分类预测,CS-BP四分类预测,布谷鸟算法优化BP神经网络多分类预测(代码完整,数据齐全)
- YOLOv5s、YOLOv5m权重文件
- 史上最全项目风险识别手册
- 历年全国大学生数学竞赛数学、非数学类初赛决赛真题汇编(2009-2021年)
- centos7 apache-2.4.58离线安装包
- 基于3个STM32F103C8T6+SP3232+光耦输入+继电器控制多路电机工业控制板硬件原理图+PCB工程文件.zip
- xmind安卓版.apk
- 基于MATLAB编程的三维箱线图
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功