EAS-SEC. Oracle PeopleSoft Security Configuration. Part 10: Logging of Security Events

One of the most important aspects to ensure the PeopleSoft security is security event logging in place. In case of an incident (which is likely to happen since there are plenty of settings and it is difficult to control all of them), only the security … Continue reading EAS-SEC. Oracle PeopleSoft Security Configuration. Part 10: Logging of Security Events

EAS-SEC. Oracle PeopleSoft security configuration. Part 9: Insecure trusted connections

Various solutions may be used to create intersystem business processes. The trusted relationships or Single Sign-on (SSO) between PeopleSoft systems allow minimizing the authentication requirements. If the calling PeopleSoft system (Node) accepts the c… Continue reading EAS-SEC. Oracle PeopleSoft security configuration. Part 9: Insecure trusted connections

EAS-SEC. Oracle PeopleSoft Security Configuration. Part 8: Access control and SoD conflicts

PeopleSoft has multiple functional opportunities, which are implemented through programs, transactions, and reports. An access to these objects should be strictly regulated by defining user profiles, roles and permission lists as the access to critical actions (e.g. access to modify data or to read any tables) enables users to attack PeopleSoft systems in order to […]

The post EAS-SEC. Oracle PeopleSoft Security Configuration. Part 8: Access control and SoD conflicts appeared first on ERPScan.

The post EAS-SEC. Oracle PeopleSoft Security Configuration. Part 8: Access control and SoD conflicts appeared first on Security Boulevard.

Continue reading EAS-SEC. Oracle PeopleSoft Security Configuration. Part 8: Access control and SoD conflicts