Specifications for its access (Add, Update/ Display, Update/Display All, or Correction) Permission lists are then assigned to Roles, which are then assigned to Users. All page access is defined on a Permission List Level. – controls access to particular or combination of page(s)/screen(s), access time, Just as it is important to understanding how Menus, Pages, and Components are developed, it isĪlso important to understand how they are secured. Permission Lists, Roles and User Profiles It is generically referred to as the “navigation”. Academic Structure can be understood as two interrelated parts: a student’s program of study and courses, classes, and the departments that own them.Įach component is assigned to a Menu Group.īy which you can get to any given page in PeopleSoft. The chart above shows how the components of the Academic Structure relate to one another.
Academic Organization Department and Schools.Academic Campus is where your campus is located.Institutions: Tacoma and Spokane District, Spokane Falls Community College, and Spokane Community College Academic Institution is an independent entity that has its own set of rules and business processes.For example, in Campus Solutions, specific users can be given access to a particular academic institution. Row level security gives specific users access to specific data.For example, in HCM, primary permission lists are used to control access to departments. Primary permission lists typically control row level security.
Definition security is used by application designer to secure definitions (e.g.Permission lists give users access to menus, components and ultimately pages.Roles give users access to one or more permission lists.Portal content references (links on the left navigation) are based on menu security.Portal folders (containers in the left navigation) are secured by permission lists at the portal level.Row Level Security (user & permission list based).Permission Lists and Definition Security.From top-to-bottom (highest to lowest level of granularity) you can look at security like this: To get your mind around PeopleSoft security, it helps to look at the hierarchy for PeopleSoft security.