Interview Questions.

Top 100+ Peoplesoft Security Interview Questions And Answers

fluid

Top 100+ Peoplesoft Security Interview Questions And Answers

Question 1. What Are The Different Delivered Security Sets And How Do They Function?

Answer :

The distinctive security units are: - Department, People with jobs, People with out jobs, US federal human beings with jobs, Recruiting activity openings and template based rent.

For each protection set, admin can allow or disable the get right of entry to kind. Based in this setup, the system will determine the type of security. For instance, department protection can be pushed based totally on department tree, that is one get entry to type or it is able to be driven via department setid that's some other access type for the security set branch.

For POIs with no process rows, to define protection, the security set People without jobs is used. The different alternatives are access types like location, business unit or organization. So, the one which is enabled, will power the safety.

Question 2. What Is Sjt_opr_cls?

Answer :

SJT_OPR_CLS: Contains the User IDs with their information permission lists.

People Soft Interview Questions
Question three. What Is Sjt_person?

Answer :

SJT_PERSON: Contains transaction facts for the human beings (employees, contingent employees, Person of Interest). It has row stage protection attributes (SetID, DeptID and so forth) for all the personnel.

Question 4. What Is Sjt_class_all?

Answer :

SJT_CLASS_ALL: Contains the statistics permission information for all of the information permission lists which might be given records access on the ‘Security through Dept Tree’ web page or ‘Security with the aid of Permission List’ page.

Question five. What Is Row Level Security? What Are The Different Ways To Design Row Level Security?

Answer :

Row level protection is likewise referred to as Data Permission Security. It determines the access given to a consumer for all/specific set of rows through any PeopleSoft element which can be introduced or custom. For a row, get right of entry to to all of the fields is given.

Row stage security restricts consumer’s get admission to to a subset of rows primarily based on the price inside a field in the document. That discipline could be branch, task vicinity, job enterprise, process earnings grade and so on. There are sure PeopleSoft brought protection units and get entry to sorts which can be used as a foundation of restriction. For e.G., limit get entry to for a person (the use of Job information component) to all of the employees having a value of ‘SALES’ for the department subject inside the present day powerful dated activity row.

Manual Testing Interview Questions
Question 6. How Is Field Level Security Controlled In Peoplesoft?

Answer :

There is no introduced security for subject stage, i.E. No configurable manage exists for subject-degree get entry to for a user. If there may be a requirement of subject stage security, then it has to be achieved at the level of PeopleCode, i.E. Programmatically.

Question 7. Suppose If A Person Is Assigned Row Security For A Department, Will He Have Access To All The Child Departments As Well? If Yes, Is There A Way We Can Restrict Access To One Of Those?

Answer :

By default, the person will have access to employees of all of the toddler departments. Although, get admission to to personnel in a baby department can be restricted through records permission list. To outline the safety profile of a branch tree, navigate to: Setup HRMS -> Security -> Core Row Level Security -> Security by using Dept Tree. For the particular row safety permission list, get entry to codes can be set to ‘No Access’ for a child branch to limit get entry to.

PeopleSoft Component Interface Interview Questions
Question 8. What Are Security Join Tables? Why Is It Necessary To Refresh Sjt Processes?

Answer :

PeopleSoft device shops security information in person and transaction Security Join Tables. (SJTs).

User SJTs are:

SJT_OPR_CLS: Contains the User IDs with their information permission lists.
SJT_CLASS_ALL: Contains the statistics permission statistics for all of the facts permission lists which can be given records get entry to at the ‘Security by using Dept Tree’ web page or ‘Security via Permission List’ web page.
Transaction SJTs are:

SJT_PERSON: Contains transaction records for the human beings (personnel, contingent employees, Person of Interest). It has row level protection attributes (SetID, DeptID and so forth) for all the employees.
SJT refresh strategies have to be run to hold safety data (in user and transaction SJTs) up to date in order that the gadget enforces records permission the use of the most cutting-edge facts.
Question 9. Suppose When A User Is Tied To A Primary Permission List How Does It Decide The Department Data Access For The Employee? Where And How Is This Mapping Done?

Answer :

User is tied to a primary permission list in person profile table. This permission listing is tied to a setid and deptid in the security setup. This may be completed by way of navigating to Setup HRMS -> Security -> Core row degree safety -> Security by using dept tree. All the departments that get tied here towards the permission listing are on hand to the consumer.

Structured Query Report (SQR) Interview Questions
Question 10. I Wish To Give Access Of A Page Which Shows The Usa Flag To A User But Wish To Exclude Some Of The Components. How Can I Do That? Explain The Steps?

Answer :

Any person whose Primary Permission List is installation to show a particular united states will show its flag as properly. The navigation for the same is: Setup HRMS -> Security -> Component and Page Security -> Setup Global Security. If america flag needs to be proven to the user, USA ought to be selected within the country prompt. There is a link to ‘Excluded Components’ inside the panel, which can be used to exclude positive additives.

Question 11. Explain The Flow Of Setting Up Application Security. When A New Functionality Is Released How Do We Setup A User In Ps To Get Access To It?

Answer :

When a new capability needs to be furnished get right of entry to for users, then roles and permissions are used. The functionality is related to a menu—factor—page. So the user needs to get get right of entry to to the web page in one of the numerous modes like: Add, update or view handiest. For this, the menu – issue – page layer is tied to a permission list. This permission listing is then attached to a role and the person is then supplied this role through user profile. As a end result user may be capable of get right of entry to the functionality.

PeopleSoft Application Engine Interview Questions
Question 12. Describe The Flow Of Setting Up Application Security. When A New Functionality Is Released How Do We Setup A User In Ps To Get Access To It?

Answer :

When a brand new capability desires to be supplied get right of entry to for customers, then roles and permissions are used. The capability is related to a menu—aspect—web page. So the person desires to get get admission to to the page in one of the numerous modes like: Add, update or view best. For this, the menu – aspect – page layer is tied to a permission listing. This permission listing is then attached to a function and the person is then provided this position thru person profile. As a end result user will be capable of get admission to the functionality.

People Soft Interview Questions
Question thirteen. If An Organization Does Not Fit To Be Position Driven Then What Are The Other Options In People Soft To Setup The Hierarchy?

Answer :

If the organization isn't in shape to be position pushed, then the opposite alternatives to be had are:

By Person: In this approach, job codes are used to categorise job facts into businesses. Job codes have one to many relationships with employees, i.E. Multiple employees will have the same task code. Jobs to be done are diagnosed inside the organisation. Job codes can be shared throughout departments, places or organizations.

Partial Position: There might be a scenario wherein the system needs to be driven by way of both the procedures – with the aid of man or woman and by using position. In this situation, partial function control can be carried out. Driving through function may work for certain departments or govt ranges whereas others may be man or woman driven.

Question 14. Can You Explain I Wish To Give Access Of A Page Which Shows The Usa Flag To A User But Wish To Exclude Some Of The Components. How Can I Do That? Explain The Steps?

Answer :

Any user whose Primary Permission List is installation to reveal a particular country will display its flag as properly. The navigation for the identical is: Setup HRMS -> Security -> Component and Page Security -> Setup Global Security. If the US flag has to be proven to the user, USA must be decided on within the u . S . A . Spark off. There is a hyperlink to ‘Excluded Components’ inside the panel, which can be used to exclude sure additives.

Question 15. When A User Is Tied To A Primary Permission List How Does It Decide The Department Data Access For The Employee? Where And How Is This Mapping Done?

Answer :

User is tied to a primary permission listing in user profile desk. This permission listing is tied to a setid and deptid within the security setup. This can be done by navigating to Setup HRMS -> Security -> Core row level safety -> Security by means of dept tree. All the departments that get tied right here against the permission listing are on hand to the person.

PeopleCode Interview Questions
Question sixteen. Do You Know How Is Security By Department Tree Different Than Security Access Types?

Answer :

Security with the aid of department tree defines which setid and deptid a permission list has get entry to to. Security get entry to types are distinct ways in which safety can be pushed for a security set. For example department security may be driven through department tree or branch setid. Both these are security get admission to sorts which belong to protection set branch.

Question 17. How Is Security By Department Tree Different Than Security Access Types?

Answer :

Security with the aid of branch tree defines which setid and deptid a permission listing has get admission to to. Security get entry to types are extraordinary ways in which protection can be driven for a security set. For instance branch safety can be driven through branch tree or department setid. Both these are security access kinds which belong to protection set department.

Peoplesoft Hrms Interview Questions
Question 18. If I Am Able To See The Brazil Flag In A Component By Means Of Global Security, Will I Be Able To See Brazil Employees Too?

Answer :

No, you would no longer be able to see Brazil employees. Global Security offers you the permission to peer a particular flag and not the data. Access to employees is given through Row level Security.

Manual Testing Interview Questions
Question 19. Suppose Organization Xyz Uses Ps Department Security. There Are four Levels In The Department Tree 1,2,3 And four With 4 Being At The Top Of The Tree. If A Manager A Is In Dept three And Has 2 Direct Reports In The Same Department. Can The Direct Reports View Data

Answer :

If the direct reports are also in branch three then they can see the records for personnel in branch 2 and 1 only. They can't see the data for a populace which is above their branch tree node. Since four is above three they can not see the statistics.

 

Question 20. Suppose Organization Abc Uses Department Security With Dept 1 As The Parent Department. Dept 2 Is The Child Of Dept 1, Dept three And Dept 4 Are The Child Of Dept 2. A Person Is Given The Read/write Access To Dept 1. Which Departments Will He Have Access To? Can We Restrict The Access To Dept 3? If Yes, How?

Answer :

Since Dept 1 is the discern department and examine/write get right of entry to is given for Dept 1, the consumer will have get right of entry to to all the departments underneath Dept 1, i.E. Dept 2, Dept three and Dept four.

Yes, we will restriction the get admission to to Dept 3 via giving ‘No Access’ to Dept three whilst defining the get entry to code for Dept 3 at the Security be Dept Tree page of the respective permission list.




CFG