Understanding Security

Security refers to the ability to restrict users from viewing or updating certain data or payees.

In Global Payroll, there are two levels of security:

  • Element-level security

    Restricts the elements that a user can view or update, based on the User Rules Profile page and the Used By, Owner, and Override Levels fields on the Element Name page.

  • Payee-level security

    Restricts the payees that a user can view, based on the standard HR security in PeopleSoft HR.

Note: Global Payroll can also use the group security feature in PeopleSoft Time and Labor.

You set up profiles for your users that give them access to country-specific element information. For example, if your organization operates only in France, users do not need element information that is specific to the United Kingdom. Element-usage security limits the number of elements that appear in prompt tables and on search pages to those that are relevant to the user.

Owner security refers to who owns and maintains an element—PeopleSoft or the customer. Certain elements can be modified only by PeopleSoft, while others can be modified by the customer.

The Owner field on the Element Name page identifies an element's owner.

Override levels for an element vary, depending on the element type. Typical override levels include Pay Entity, Pay Group, Payee, Calendar, Via Elements, Element Definition, and Positive Input. You select these on the Element Name page by using check boxes. These check boxes indicate whether the element can be updated through overrides or by another element.

The update Via Element security feature controls which elements can be updated by another element. You can update an element by means of another element in four places in the application:

  • Arrays (through the Map Retrieved Fields to Variable Elements fields on the Field Map and Keys page).

  • Brackets (through the Return Columns fields on the Bracket Search Keys/Return Columns page).

  • Dates (through the Date Extract fields on the Date Extract page).

  • Formulas (through the Assign To columns on the Formula Field-by-Field page).

The system checks the User Rules Profile and element-usage security to ensure that only elements that are available for access can be updated by another element.