Configuring Application Security

This chapter provides an overview of the Security Object model and discusses how to define and maintain security.

See Also

Setting Up Security and User Preferences

Click to jump to parent topicUnderstanding the Security Object Model

In the financial services and insurance industries, every financial account and policy has a matrix of security rules. This security matrix contains information about an individual's reach and limit for a particular account. The Security Object model contains the matrix of security rules. When creating or maintaining an account, security keys are created.

The following diagram shows the process flow of the Security Object model.

Security Object model

Security Objects

Security objects are delivered with the system. Any changes to the security objects affect security keys and the security list table. For this reason, PeopleSoft recommends limiting the number of security objects created. Two security objects are delivered. The Financial Account security object (ACCOUNT) is a view privilege type security object, and the Authorized Users (ACCOUNTHOLDER) is a membership type security object. Both objects are system data. Not all objects can be used as security objects.

Security Membership Domain

The security domain for the aforementioned security objects is a static list. The view object domain of the Financial Account object consists of all available accounts. Although these security domains are delivered and designed as static lists, you can define your own dynamic domains.

Security Keys

Security keys are created for each individual that takes part in the security model. One security key is generated for each individual. Security keys are created and maintained by either enterprise integration points, or by the online security matrix component.

Click to jump to parent topicDefining and Maintaining Security

This section provides an overview of security definitions and maintenance, and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Security Definition and Maintenance

The administrator uses the security matrix to define and maintain permissions granted to system users. Each row in the matrix represents a specific transaction for a specific account.

The security matrix can be populated using the Security Matrix page or programmatically.

Use the Security Matrix page to add, delete, or update rows in the security matrix.

Enterprise integration points are used to created financial accounts and their security. The inbound EIP receives the security matrix data, and the subscription code creates the security keys.

Each time an agent accesses a customer account through the 360-Degree View page, the security trace provides an audit trail.

The administrator uses navigation security to show or hide individual component items in the PIA navigation of the Agent view. Permission lists and roles determine portal navigation. Navigation security layers control access to specific menu items on top of that. This security layer would hide an item even though the user has access to the component.

To maintain the security matrix, use the RBF_SRTY_MTRX_SRCH component.

To review access trace information, use the RBF_SRTY_ACTR_SRCH component.

To set up navigation security, use the RBF_NAV_SECURITY component.

To define role mapping, use the RBF_ROLE_MAPPING component.

Click to jump to top of pageClick to jump to parent topicPages Used to Define and Maintain Security

Page Name

Object Name

Navigation

Usage

Security Matrix

RSEC_SRTY_MAT_SRCH

Set Up CRM, Security, Financial Services, Security Matrix

Define permissions granted to system users.

Security Trace Access

RBF_SRTY_TRC_SRCH

Set Up CRM, Security, Financial Services, Access Trace, Security Trace Access

View an audit trail of all user account access.

Navigation Security

RBF_NAV_SECURITY

Set Up CRM, Security, Financial Services, Navigation Security

Grant or remove access to content on the portal pages. Hide certain pages for a particular PeopleTools role even though role users have access to the components.

Role Mapping

RBF_ROLE_MAPPING

Set Up CRM, Security, Financial Services, Role Mapping

Map roles.

Sales Process Verification Key

RBF_SALES_VKEY

Set Up CRM, Security, Financial Services, Sales Process Verification Key

Validates employee status.

Click to jump to top of pageClick to jump to parent topicMaintaining the Security Matrix

Access the Security Matrix page.

Main Info Page

Account Number

Select the applicable account number. You need one row for each allowable transaction on the account. You must have at least one row for each account; however, you may have multiple rows per account.

Transaction Code

Specifies the type of financial transaction for which the security is built.

Approved

Select to indicate that the transaction is allowed for this account.

Conditional Operator

Select if the transaction is allowed with a condition and populate operator applicable for the condition.

Conditional Amount

Select the amount for the condition.

Message Catalog Set Number

Displays the message catalog entry that a user sees when denied to perform a transaction due to insufficient security.

Audit Info Page

Access the Security Matrix page: Audit Info tab (audit information).

The system displays an audit trail of all additions and modifications to the security matrix.

Click to jump to top of pageClick to jump to parent topicReviewing Access Trace Information

Access the Security Trace Access page.

Start Date/Time

Displays when the agent accessed the customer accounts through 360-Degree View page.

End Date/Time

Displays when the agent released the 360-Degree View page. Using the Back on the browser toolbar does not release the 360-Degree View page. The agent can still access the page by clicking Agent View or the forward button. If the agent signs out of the PeopleSoft application by clicking the Sign Out link or closing the browser, the closing timestamp not recorded. To release the 360-Degree View page and record the closing timestamp, click the Finish and Return to Search link on the 360-Degree View page.

Click to jump to top of pageClick to jump to parent topicSetting Up Navigation Security

Access the Navigation Security page.

Role Name

PeopleTools role for which navigation security is applied.

Portal Name

Portal name in which the left navigation menu item is secured.

Portal Label

Label name of the left navigation menu for which security is applied.

Click to jump to top of pageClick to jump to parent topicDefining Role Mapping

Access the Role Mapping page.

System Role Name

Lists the system-defined roles delivered.

User - Defined Role Name

Lists the customer's roles that will be mapped to the system-defined roles.

Click to jump to top of pageClick to jump to parent topicDefining Sales Process Verification Keys

Access the Sales Process Verification Key page.

Verification Key

Used in the sales process to verify employment of employees and existence of company contract.

See Also

Setting Up Security and User Preferences