Security in PeopleSoft 9.0 or above is like a set of Nesting Dolls. Complementary layers support each other to develop an access profile for each user. We will discuss each layer beginning with Permission Lists and ending with the unique way we are using to request access for staff.
Financial Systems
HCM Systems
Student Success
CRM
Connected Campus
Project & Change Management
Alliance
International / Regional
E-Academy
Attendee Terms & Policies
HEUG Code of Conduct