You are on page 1of 21

APPLICATION DESIGNER What is an Application Designer?

Application Designer is an integrated development and upgrade tool that contains collection of related object definitions, these objects are useful for specific purpose means using this objects we can develop projects according to the user requirements. What are the 8 Development Steps? 8 steps in Developments steps Design the Application. Create Field Definition Create Record Build the Record Design the Page Create Component Register the Component Test the Application Difference between upgrade and development view? In Development view we will create or modify many types of definitions but in the upgrade view we will have only those definitions that are available for upgrade. How many types of tables are there in database and what are their differences? 1. System Catalog Tables 2. People Tools Tables 3. Application Data Tables System Catalog Tables: System Catalog Tables stores physical attributes of the tables and views. Naming convention for these tables is SYS. PeopleTools Tables: The objects that we develop using the People Tool Objects are saved in PeopleTools Tables. Naming convention for these tables prefixed with PS_. Once a field is created it would be stored in psfield definition table, once a record is created it would be stored in psrecdef. (Only definition/structure is stored) Application Data Tables: stores the data, which is entered by the user through PeopleSoft application windows and pages. Naming convention for these tables is PS_. Application Data Tables are divided into 2 types: 1. Control Tables 2. Transaction Tables Control Tables: Define the company structure and processing rules. Transaction Tables: These are tables used to record our day-to-day transactions, such as personal data about employees. What is a prompt table? Prompt tables are the most common methods for validating data entry in peoplesoft applications. This is like application data table the only difference is that it stores values that other tables can validate against. Prompt table is a control table. (Country table and Company table)

What is a Translate Table where are the Translate table values are stored? It will store values for fields that don't require an individual prompt table, It is also known as xlat table. The data we store in the translate table does not change often. Each database contains one translate table. (blood types, days of the week)

Structure of the Translate Table (PSXLATITEM) Field Name FIELDNAME LANGUAGE_CD FIELDVALUE EFFDT VERSION EFF_STATUS XLATLONGNAME XLATSHORTNAME LASTUPDDTTM LASTUPDOPRID Description Field name, such as ABSENCE_TYPE Language code Value for the field Effective date Internal version number (system-maintained) Statusactive or inactive 30-character description; used as a label on pages and reports 10-character description; used as a label on pages and reports Date Time field showing the last time that a field was updated User ID of the user who most recently updated the field

How many table edits are there in Record field properties? 1. Prompt Table With Edit 2. Prompt Table No Edit 3. Translate Table 4. Yes/No Table Edit Prompt Table No Edit: Provides List of Suggested values, which users cannot edit. Prompt Table With Edit: Users can edit the contents of the field against the values that are maintained in the specified prompt Table. Translate Table Edit: Which is nothing but a translate table created by developer. Yes/No Table:In some situations we want the user to enter only Boolean values like yes or no true or false in this situation we will use yes no table. The Translate Table for ex: PSYESNO. When you select the Yes/No Table Edit, the system automatically points to the PSYESNO field in the Translate Table Difference between prompt table with edit and No Edit? Prompt Table No Edit: Provides List of Suggested values, which users cannot edit. Prompt Table With Edit: Users can edit the contents of the field against the values that are maintained in the specified prompt Table. What is effective date? Date on which a table row becomes effective, the date that an action begins. For example, if you want to close out a ledger on June 30, the effective date for the ledger closing would be July 1. This date also determines when you can view and change the information. Pages or panels and batch processes that use the information use the current row. Effective date enables us to keep historical, current, and future information in tables. There are three types of effective dates: Current, History and Future. What is effective status? EFF_STATUS usually accompanies EFFDT. For example in Department table suppose we inactivated one dept from so and so future effdt, from that future date onwards this dept is going to be inactivated,

after that whenever we click the link prompt button of dept id field we can see only active departments. What is effective sequence? Whenever we want to enter more than one transaction on the same day for an employee like promotion and salary hike we will use effective sequence. Effseq number starts with 0 How many Actions are there in the Component Properties dialog (Use Tab)? Add: Used to add a new high-level key, such as a new employee ID or a new customer. Except in the case of effective dating Add is used to insert new current row or update future rows. If we select only Add action then we cant modify the existing rows. (Doesnt have any effect with effdt) Update/Display: Used to update existing rows only. Update/Display All: Used to update current and future rows in an effective dated record. Only used with effective dated records. Correction: Used to update any rows (history, current and future) in an effective dated record. Only used with effective dated records. Data Entry: Not supported in PeopleSoft Internet Architecture What is the difference between Key and Duplicate Key? Whenever a field is a key field we cannot have duplicate values in that field. Key is used to identify the field as the search criterion that uniquely identifies each row. Duplicate values are allowed, for example in composite keys like if we have 4 fields at least one field should be unique ex: in job table emplid, emplrcd, effdt and effseq What is from search key and through search key in Record properties? From search key: Gives the values from the specified value to the max values For ex: if we have to search values after emplid of 100 to the max then we should enter 100 in the from search key. (total values to be displayed are 300 values) Through search key: gives values from the given value 300 values.

What is the difference between key and search key and also alternate search key? Keys determine the structure that makes a row of data unique. A key may also be a search key, which makes the field appear on search pages to help users locate rows of data. Alternate key are only used for search pages and have nothing to do with the table structure. Alternate search key provides an alternate path into the table data. It will appear to the user whenever he clicks advanced search option. How many types of tables are there? Define them? SQL Table: A physical SQL Table present in the database, this is the default. SQL View: Not a physical SQL Table but corresponds to a view written in SQL referring one or more fields from different tables. This gives a filtered view of information stored in tables. Stored in the database as a view. (Query view is system generated and SQL views are created by developer) whenever you modify a record you need to take care: check if any views are dependent on this record. Dynamic view: A record definition that can be used like a view in pages and People Code but is not stored as a SQL view in the database. Dynamic views provide superior performance. Derived/Work: We can use it to calculations. It is not an object, and also we can use it as a funclib. A temporary workspace to use during online page processing. A derived or work record is not stored in the database, so no need to build it. Sub Record: Group of fields used in multiple records like companies having address data of employees. If you have to use the same fields in different record definitions, then we will store all those fields in a subrecord and add this subrecord as a field to the record definitions. Stored in the database.

Query View: using the PeopleSoft Query we dont need to write a query it will automatically generate by dragging and dropping. This is a two tier tool and runs through application designer and produces SQL dependent upon the host RDBMS. Temporary Table: we will do all the manipulations on the data present in the temporary table. Increases the performance, as it is not stored in the database. Used mainly for the AE batch processes. What is a dynamic view? Where we can use dynamic View? It can be used like a view in pages and people code but not stored in database as a sql view, instead the system uses the view text as a base for the sql select that is performed at runtime. These views shows superior performance in some situations such as search records and people code selects. What is difference between SQL View and Dynamic View? SQL views are written against the RDBMS catalog tables. Dynamic view is declared only to people tools and not to the system catalog. SQL views are not recommended for performance tuning as they run against the database. Dynamic views improve performance. SQL views reside in the database dynamic views are not. Advantages of Using Search Views instead of Search Table As the search view is created with selected fields there will not be much stress on app server and there by improves the performance. Search View also gives additional search criteria. What is the difference between record properties and record field properties? Record properties apply to the entire record definition. Record field properties are not shared among records, they are specific to a single record definition and are stored with the record. Each record stores a unique set of record field properties while the primary field definition remains the same. What is Component Buffer? Area in memory, which stores data for the currently active component. Whenever you open a component the entire data for that component is retrieved upfront and stored in the application server. Component buffer is a temporary buffer allocation.

What is component processor? It is a peopletool runtime engine that controls the processing of the application.

What is a data buffer? Data buffer contains multiple components of data. What is the difference between component buffer and data buffer? Component buffer contains active component data i.e. level 0 data. Data buffer contains multiple components of data. What data comes into Component Buffer? Primary record data, related display fields, translate values and derived work records. If you keep key and alternate search key on 0 level then only 2 values will appear in Component Buffer the other field values will not available. In Component Buffer if you want to see the other field values then place a non-key field

on 0 level and make it invisible. Every level will have its own primary record. A level 0 primary record and a search record can be different but the key field values should match. How many levels can we have on a page? Page allows Nested levels up to 3 levels. What are Level Based Controls and their Difference? Level Based controls are Scroll Area, Grid and Scroll Bar. Scroll areas have their page fields arranged by the developer. Page fields in a gird always appear in a single row. In grid we can view no of rows by giving occurrences. Scroll areas provide a row separator when you select multiple occurrences of data. We can view multiple rows in a grid while in a scroll area you can retrieve only one row at a time. One can have nested scroll areas but not grids. You can insert grid in a scroll area but not scroll in a grid. What is the difference between scroll area and Grid? Scroll areas single row of data will be displayed whereas in grid multiple rows of data will be available. Difference between standard, secondary and subpage? Standard page: It is the graphical interface between users and database. The important data is displayed in the standard page. We can place secondary as well as a subpage in standard page. Secondary Page: Page that will open on users request but remains as a secondary to the primary page display. We can open it through standard page only. The data within secondary page is at the same level or below the level of the page control that launches the secondary page. Subpage: subpage controls are used to provide standard look for the commonly used fields. A sub page is referenced as a page control on multiple standard pages. Difference between subpage and sub record All the fields in a subpage must be associated with fields of a sub record in the specified record definition. Subrecord contains all related fields, whereas subpage contains fields from sub record.

What is occur level and occur count? Occurs Level: Occurs level determines the level of the object that we inserted. By using this we can set levels for example after inserting a level based control in level 2 if you want to change the level based control to level 1 you can change the occurs level. Occur Count: Occur Count determines how many rows should be displayed. For ex if you want the scroll to display only 5 rows then we will give occurs count to 5. Difference between Search Record and Add Search Record Search Record: The search record controls access of rows of data in a table, and its keys and alternate search keys appear on the search page as criteria. The search record might also contain logic to filter the search to secure rows of datarow-level security is implemented in this way Add search record: Add search record is specifically used for add actions. If we are using a search view as a search record for performance in this situation we will put the main record as a add search record so that we can enter new values in this main record. The system default is the standard search record if we don't specify an add search record What are the options available, while building a table? The Build process uses Data Definition Language (DDL) to construct a physical database component that is based on the associated record and field definitions that you created. With the Build feature, you can

create the following. Create Tables: Creates structure in database. Create Index: When you build a table, it also creates index for that table Create View: It will create a sql view. Alter Tables: When you dont want to lose the existing data we build that record with this Create Trigger after the Build process begins, there are no runtime prompts until the process is complete. All events are written to the Build log. What are the three build options available when building a table from a record? Build script file: which generates a sql script that can be run against the desired database to build the table. Execute SQL: which builds the table in the database. Execute and build script: which both build the table and generates a sql script. Can you write People Code in Secondary as well in Sub Page? People Code can be used on the secondary page just like any other page. We cannot write People Code for Subpage. Can we have 2 Scroll areas at Level 1? Yes, we can have 2 scroll areas at level 1.

What are multi level pages where should the field at level 0 be getting their data from? Level 0 fields must be associated with record fields of search record. Can we keep 2 records at level 0? Yes we can have 2 records at level 0 provided should match the key fields. Audit Table and their fields? Record and Field Level Audits Records the information of user actions details as well as the changes or additions or even modifications done on the table. Audit records are prefixed with Audit_. Audit Field Name AUDIT_OPRID AUDIT_STAMP AUDIT_ACTN Purpose Identifies the user who caused the system to trigger the audits either by performing an add, change, or delete to an audited field. Identifies the date and time the audit was triggered. Indicates the type of action that the system audited. Possible actions include: A: Row inserted. D: Row deleted. C: Row changed (updated), but no key fields changed. The system writes old values to the audit table. K: Row changed (updated), and at least one key field changed. The system writes old values to the audit table. N: Row changed (updated), and at least one key field changed. The system writes new values to the audit table. Identifies the name of the record definition that was audited.

AUDIT_RECNAME

Record Level Audit: for creating a record for record level audit we need to have 3 fields Audit_operid,

Audit_stamp, and Audit_action. We can create our own audit records by prefixing Audit_ Field level Audit: By using delivered PS_AUDIT table we can set field level audit.

What are the key disadvantages of auditing? Auditing adds overhead to transactions that will slow database performance. Audit tables can grow to be quit large, again draining resources. What is SQL Object? People tool object that we can create and use it wherever we want PC, views, and dynamic views. %SQL. Differed and Interactive Processing In Interactive mode for every cursor action there will be a trip to the server. In deferred processing mode, trips to the server are reduced. In Interactive whenever a user exits a field there will be a trip to the server. In Differed processing until a user performs an action, which requires a trip to the server there wont be any trips to the application server. In how many places we can set Differed processing? Field Record Page Component What is the design Considerations while designing a page? Put the field control on the appropriate derived or work record, rather than on a regular data record definition to derive its value. Use as few record definitions as possible in a component. Do not remove table edits to improve performance, even though an edit against another table causes a short pause. Eliminating them might compromise data integrity. Apply deferred processing when possible to fields, pages, and components What is registering a Component? We will add the component to a Menu and give permissions and security.

What are the considerations that you take while altering a table? Any time one intends to change an existing object we should always attempt to find out if the changes are effecting on other system objects. Edit> find definition reference: If a definition reference any other definitions we must research the connection and determine with the referenced object will have any effects then we need more follow-up. Can we use the same Component in 2 Menus? Yes , we can use same component in any no of menus Can we have a subpage at 0 Level? Yes, we can have a sub page at 0 level. Can we have a Secondary page at 0 Level? We cannot have a secondary page in 0 Level.

Can we have a Grid in Level 2 and scroll area in level 3? Yes we can. But performance issues say that a grid should always reside in the last level Can we have Nested Grids? No we cannot have Nested Grids. What is Parent Child Relationship? To maintain parent child relationship if the parent table contains one key field the child table should contain the same key field and one additional key. In parent child relationship we should have a relation between two tables ex: if A is the parent table with x as a key and B is another table then B should have x as a key with another key y, then B is the child table of for table A. What is the difference between primary record and the search record? Each scroll area and grid is associated with a single primary record. This represents the application data table the page fields are associated with. All fields in a scroll area or grid must be associated with one (and only one) record, which is the primary record for that level. The search record builds the search page for a component and populates all fields at level 0. The search record is determined at the component level.

What is PIA Architecture? In PIA end users do not have any peoplesoft specific software installed on their machines, they use Internet browser to connect web server, which interacts with application server.

What are components of PIA?


1. 2. 3. 4. 5.

Web browser Web server Application server Batch server Database server

What are major tasks that the application server performs in PIA? The application server maintains a persistent connection to the database, and converts peopletools and application table data into HTML. The server then provides the HTML to the web server for delivery to the browser. The application server also plays a role in connecting development workstations to the database for three-tier connections. What are the major tasks performed by the web server in PIA? Web server acts as the front end of the PIA. The Web server includes Web services software that displays the HTML to the browser. It also includes java servlets that manage each sessions connection to the application server.

What is Tuxedo/Jolt? Tuxedo manages the multiple connections to the database. Jolt is a java based communication protocol. The assembled HTML is sent to the web server.

What is a metadata? Software that resides on a web server and displays HTML for a Browser.

When you select a row of data from a search page where you are taken to? The search page takes you to a component the component is made up of one or more pages with each page containing several fields that hold the data. What is the difference between adding a row of data and inserting a row of data? When you use the add action a new high level key is created at level 0, when you insert a row of data you are adding information that has a one to many relationship with the key at level 0. Generally you insert rows within scroll areas are grids.

How do you recognize levels on a page other than level 0? Levels are bound by either a scroll area or a grid.

When exporting a project to a file in what format is the definition data stored? Projects are stored in XML files.

Can projects be used to transport application data? No, Peoplesoft offers a different tool data mover to transport application data. Projects only hold people tools data.

What 2 methods are available for transporting definitions in a project between the databases? Projects can be exported directly to another database or they can be exported to a file. When you export to a file you must take the extra step of importing the file from the target database. By using import and export commands we can transfer. What is Business Unit? What are the major functions? A business unit is a way of tracking specific business information for reporting and other roll-up data collection. It performs 2major functions 1) It allows you to maintain a tree structure to facilitate customer-specific roll-up reporting. 2) It allows you to distribute and administer certain control tables like the department table. This is extremely important for large or multinational companies. What is Setid? Setid's are key to linking business units to record control groups. It is the key on all control tables in tableset sharing Every row in a control table includes a setid as its key. Setids partition the data into

groups or sets of data that are appropriate for each business unit. What is Table Sharing? Tableset Sharing is a method of filtering prompt data so that only appropriate values are available for data entry. With tableset sharing, a single table can offer different values based on underlying business rules. Table set Sharing is organized around these basic elements: Business Units and transaction tables SetIDs and control tables Business rules. What is the difference between a business unit and a setid? A business unit is a way of tracking and reporting specific business information for reporting and other roll up data collection. It does not have to be a legal entity for HR. Its a way of organizing your organization. A SetID is a link to Table Set Sharing. Table set sharing simply consists of assigning specific SetIDs to specific record groups for individual business units to restrict the view of rows of data within control tables. Its a way of organizing your data in the system.

SECURITY

How Many Ways we Can Implement Security In People soft? We can Implement security in People soft in 6 ways: 1. Signon and time-out security. 2. Page and dialog security. 3. Batch environment security. 4. Definition security. 5. Application data security. 6. PeopleSoft Internet Architecture security What is Permission List? A Permission List is a list of authorizations that we assign to roles. What is a Role? A role is an intermediate object that links the user profiles to the permission lists. Roles enable you to add permissions to users dynamically. What is user profile? A User Profile is a set of data about a particular user. And is useful to define the individual PeopleSoft

10

users. We define User Profiles and then link them to one or more Roles. Typically, We link a User Profile to at least one Role in order to be a valid profile. The majority of values that make up a User Profile are inherited from the linked Roles.

What type of permissions can contains a Permission List? Permission List stores the Sign-On times, Menus, PeopleTool access, such as access to Application Designer. Can we assign multiple roles to user profile? Yes. Can we assign multiple permission lists to roles? Yes. What is Single sign on? At a time we connect to more than one database. Means if we are in HR database, after completion of the transactions if we want to enter into FIN database, for this we need not reenter the password. What is a sign on time? A sign on time is an adjustable interval during which a user is allowed to sign on to PeopleSoft. How we specify the sign on times and time-out interval? Using Maintain Security we can specify both the sign on times and time-out interval. Is it possible to restrict some users to access specific actions? Yes. How we execute the batch process? By using the Process Scheduler. But we should assign the appropriate Process Profile to the User Profile and create process groups for our processes. Can we add the Process Profile Permission List directly to the User Profile? Yes. We can add the Process Profile Permission List directly to the User Profile, not to an intermediary Role.

What is User ID? A PeopleSoft User ID is an ID which we enter at the PeopleSoft sign on dialog box. Using the User Id we can enter into the PeopleSoft system. How can we assign a User Id and Password to a PeopleSoft user? Using the PeopleTools Security. What is Connect ID? Using the Connect Id we can connect to the Database. How can we create the Connect IDs? By running the Connect.SQL and Grant.SQL scripts.

11

What is User ID? A PeopleSoft User ID is the ID we enter at the PeopleSoft signon dialog box. Using People Tools Security, we assign each PeopleSoft user a User ID and password. The combination of these two items grants users online access to the PeopleSoft system. The system can also use a User ID stored within an LDAP directory server. The User ID is the key used to distinctly identify the User Profile definition. What is Connect ID? Connect ID is a valid user ID that, when used during login, takes the place of PeopleSoft User IDs for the logon process. Using Connect ID means we don't have to create a new database user for every PeopleSoft user that we add to the system. Connect ID is required for a direct connection (two-tier connection) to the database. So application servers and two-tier Windows Clients require a Connect ID. We specify the Connect ID for an application server in the Signon section of the PSADMIN utility, and for Windows Clients we specify the Connect ID in the Startup tab of the Configuration Manager. We can create a Connect ID by running the Connect and Grants scripts. What is Symbolic ID? We use Symbolic ID as a search key for retrieving the encrypted value of Access ID, which is stored in PSACCESSPRFL. Also, the Symbolic ID acts as an intermediary entity between the User ID and the Access ID. All the User IDs are associated with a Symbolic ID, which in turn are associated with an Access ID. For example if we had to change the Access ID, then we need to update only the reference of the Access ID to Symbolic ID in the PSACCESSPRFL table rather than updating with each and every User Profile in the PSOPRDEFN table. What is Access ID? While creating a User ID, we will assign a Access Profile to the user id, which specifies an Access ID and password. PeopleSoft Access ID is the RDBMS ID with which PeopleSoft applications are ultimately connected to the database after the PeopleSoft system connects using the Connect ID and validates the User ID and password. An Access ID typically has administrator-level database access; that is, it has all the RDBMS privileges necessary to access and manipulate data for an entire PeopleSoft application. The Access ID should have SELECT, UPDATE, and DELETE access. It's important to understand that users do not know their corresponding Access ID. They just signon with their User ID and password andbehind the scenesthe system logs them onto the database using the Access ID. Should they try to access the database directly with a query tool using their User or Connect ID, they have limited access. User and Connect IDs only have access to the few PeopleSoft tables used during signon, and that access is SELECT-level only. Furthermore, PeopleSoft encrypts all sensitive data that resides in those tables.

What is the procedure to create a Permission List?

Go to PeopleTools, Security, Permission & Roles, Permission List. On the Search page click Add New Value. In the Permission List edit box enter the Permission List name as xy. And click Add. Give the description if required and then click Save. Go to Web Libraries Tab include all the 27 libraries. Click Save. (Then we can enter into the

12

Go to any tab specify the required options then save.


What is the Procedure to create a new Role?

browser environment).

Go PeopleTools, Security, Permission & Roles, Roles. On the Search page click Add New Value. In the Role Name edit box enter the Role name as xyz. And click Add. Give the description if required and then click Save. Go to Permission List Tab and specify the Permission list name as XY, then click Save.

Go to any tab specify the required options then save.


What is the Procedure to create a new User Profiles?

Go PeopleTools, Security, User Profiles, User Profiles. On the Search page click Add New Value. In the User Id edit box enter the User Profile name as xy. And click Add. In the General Tab specify the symbolic id as sa1. Go to Role Tab and specify the Role Name as xy. Then Save

What is the Procedure to implementing Definition Security? Go, Definition Security in Application Designer. File, New Group (Here we can specify all the objects which we want give the permission to access the user). After creating new groups if we want to modify the group then go to File, Open, Group Then specify the Group Id. File, save (save the new group). File, Open, Permission List. Then specify the Permission List. Then assign groups to the permission list. Then Save. Close Application Designer and Definition Security. Reenter with the new user profile and observe all the things. What is a Access Group? Access groups are nodes in a query tree, which are built with PeopleSoft Tree Manger. After we build a query tree, we give users access to one or more of its access groups. Then they can generate queries on any tables in the access groups accessible to them. When we open Query Manager, it displays either an access group structure or an alphabetical list of records to which we have access. Access groups enable us to logically organize the record components to control security access within Query. It is not a physical representation of database. The record components shown are those that the user has been granted access to. Adding a Access Group: Open the desired Permission List and select Query, Access Groups Permissions. Select a Tree Name. Use the drop-down list boxes to find the Tree Name that we need. Select the highest Access Group that the user can access.

13

Use the drop-down list boxes to find the Access Group. The system displays only the access groups in the selected query tree. The Access Group selected should be the highest-level tree group to which this Permission List needs access. The Accessible check box is selected by default. For example, users in the ALLPANLS permission list have access to all record components in the EIS_ACCESS_GRP and all access groups below it in the QUERY_TREE_EIS query treein other words, to all record components in the tree. Clear the Accessible check box, if desired. Save. What is a Process Group? Process groups are collections of Process Definitions that we create using PeopleSoft Process Scheduler. We add process groups to permission lists on the Process Group Permission page. Typically, we group Process Definitions according to work groups within our organization, and typically that work group would have a particular role associated with it. Regardless of how we organize our Process Definitions, we must assign process groups to a permission list. Users can run only those processes through Process Scheduler that belong to process groups assigned to their role. What is a Process Profile? The process profile definition (defined in Process Scheduler) determines the default Process Scheduler settings for a user. For example, with the process profile, we specify such settings as where the system delivers the output of the process, whether the user can update the process request, and so on. What is Primary Permission List? Data permissions, or row-level security, appear either through a Primary Permissions List or a Row Security Permissions list. What is Object Security? Object / Definition Security is a separate People Tool that is used to restrict access of application developers. We use Definition Security to govern access to the individual database object definitions, such as Record definitions, Field definitions, and Page definitions. We use Definition Security to protect particular object definitions from being modified by certain developers.

What is a Row Level Security? With row-level security, users can have access to a table without having access to all rows on that table. This type of security is typically applied to tables that hold sensitive data. People Soft applications implement row-level security by using a SQL view that joins the data table with an authorization table.

How to implement row level security by operator id? You can design special types of sql views security views to control access to individual rows of data stored within your application database tables. peoplesoft applications are delivered with built-in row level security functions, tailored to the specific application.

What is the use of PeopleSoft Internet security? PeopleSoft Internet security controls the user access to shared hardware and software resources, So that only authorized users can connect to the web and application servers. This is also called Runtime

14

Security. What is the use of Web server/Application server security? Web server/Application server security controls access to system objects and resources, So that only authorized users can connect to a given database. What is the use of Database security? Database security controls the access to database tables.

What is the use of PeopleSoft application security?

At what level we can setup the PeopleSoft application security? User Level Row-Level Field-Level Object level. Tell about User Level security? By using the Maintain security PeopleTool we can establish the user security. Using the User Security we can controls the user access into PeopelSoft applications. How can we implement the Row-Level Security? What is the use of Row-Level Security? For this we dont have any PeopleTool. Row-Level Security is implemented by using the SQL Views. Using the Row-Level Security we can controls the rows of data that can be accessed by each user. How we implement the Field-Level security? What is the use of Field-Level security? By assigning the PeopleCode to the field. Like Hide Unhide, Gray, Ungray. Using the Field-Level security we can control the user access to specific data filed. How can we establish the Object security? By using the Definition Security PeopleTool. What is the purpose of the Definition Security? Using the Definition Security we can restrict particular objects from application developers. But not for the end users. How many objects we can develop using the Definition Security? Only one objects that is Group ID. Can we run the Definition Security in Browser environment? No. it is applicable only in windows environment. What is the difference between Maintain security and Object Security (Definition)? By using the Maintain Security we can restricts the users to access the particular functions like some

15

pages, some records, but using the Object security we restrict the total objects. Ex: if we don't want a developer to touch Application Engine programs, don't allow them to access Application Engine.

What is Batch Environment Security? or How do you give security to batch programs like SQR and A.E? There are three levels of security for batch programs: Each batch program has a run control that we define before we can run the batch program. The run controls are set up using PeopleSoft Process Scheduler

Also using PeopleSoft Process Scheduler, you set up Process Groups, which are groups of batch processes. Then in PeopleTools Security you add Process Groups to a security profile. Users can run processes that belong to the Process Groups assigned to their security profile.

In your RDBMS environment, you can restrict off-line access to batch processes using the security tools described in your platform manuals. Note: You add the Process Profile Permission List directly to the User Profile, not to an intermediary Role.

What is PeopleSoft Internet Architecture Security The PeopleSoft Internet Architecture is in the category of PeopleSoft online security, also known as runtime security. Only authorized users can connect to the web and application server, and only authorized application servers can connect to a given database.

COMPONENT INTERFACE

What is Component Interface? Component Interface is a peoplesoft object used to access PeopleSoft Component from external clients (Third Party Applications) including all business rules and data without going through the peoplesoft client. We use component interface to expose peoplesoft component (methods and properties) to the external software (ex vb,c,c++,java,com,dcom etc) What are the major elements in the Component Interface Architecture?

16

There are three fundamental elements in the component interface architecture 1. components 2. component interfaces 3. Component interface API. What are the attributes of the Component Interface? 1. Component interface name. 2. Keys (get keys, create keys, and find keys). 3. Properties and collections (fields and records). 4. Methods.

How many types of keys are there? Keys are 3 types 1. Get keys 2. Create keys 3. Find keys Get keys are nothing but search key of the component search record, We cannot change the get keys. Create keys are based on the add search record keys (add mode) and generated automatically for the component interface. We cannot change the create keys Find keys are based on search key and alternate search keys of the search record. We can remove find keys if we dont want to use.

What is component interface properties? Properties: Properties are individual fields in component for component interface Properties are 2 types 1. Standard properties 2. User defined properties Standard properties exists for every component interfaces.

What is Collections? Collections are referred as scrolls(level based controls will be having a primary record) in component for component interface. CreateKeyInfoCollection: Returns a set of items that describes the create keys. GetKeyInfoCollection: Returns a set of items that describes the get keys FindKeyInfoCollection: Returns a set of items that describes the find keys PropertyInfoCollection: Returns a set of items that describes properties. What is Component Interface Methods? How many Methods are there? Methods are objects that perform a very specific function on a component interface at run-time. The event of a component interface is methods (like on execute for app-engine.) 2 types of methods are there 1. Standard methods

17

1. User defined methods

What are standard methods? Standard methods are those that are available for all component interfaces. Cancel, Create, Find, Get, Save. We can disable the standard methods, if we dont want that functionality by going to the CI properties dialog box. These standard methods provide basic functionality for any CI. User defined methods: User-defined methods are created in PeopleSoft Application Designer to provide added functionality to the component interface. These methods are functions that are made accessible through the component interface. Each function maps to a user-defined method. How can we create a new Component Interface? 1. Select File, New from the PeopleSoft Application Designer menu. 2. Select the Component Interface definition type from the new dialog box. 3. Select the component, which is base for the component interface. 4. Click Save to save the Component Interface. 5. Save the component interface Can we map more than one component at a time from the Component Interface? No. A component interface maps to one, and only one, PeopleSoft component. How can we access the component data? By internal (PeopleCode) and external (Java, C/C++, or COM) applications. Can we create the get keys and find keys manually? No. When we create a new component interface, get and find keys are created based on the search record definition for the underlying component. How many types of properties can include the Component Interface? Standard properties User-Defined Properties What are the standard properties? InteractiveMode GetHistoryItems EditHistoryItems. Can we create the user-defined methods? Yes. We can create user-defined methods after creating a Component Interface. Steps to Create Component Interface: Create 3 fields Nut_Id (Character, 5) Name (Character, 15) Salary (Number, 7.2) Create new record and insert these 3 fields. Save the record with the name nut_source.

18

Save as the nut_source record to nut_target. Create new page and insert all the fields of nut_source record. Save the page with the name nut_source. Create new page and insert all the fields of nut_target record. Save the page with the name nut_target. Create new component and insert nut_source page and go to the properties and specify the search record as nut_source in the use tab. Create new component and insert nut_target page and go to the properties and specify the search record as nut_target in the use tab. Register the two components. File > New > Component Interface object. Then it asks the component, so give our target component name that is nut_target. (Means we are creating the Component Interface based on the target component). Save the Component Interface with the name nut_compointerface. Build, PeopleSoft API. Then press ok. Go the source record that is nut_source. Drag and drop the Component Interface into nut_id (any field we can choose). Save Post Change event. Remove the comments of (Execute Cancel, Execute Save, Execute Create ) add the comments to Execute Get. Add the comments to Execute Get. Delete rem and <*> from rem &oCnuCOmpointercace.nut_ID = <*>; and drag the nut_ID field from nut_ SOURCE record. Delete rem and <*> from rem &oCnuCOmpointercace.nut_NAME = <*>; and drag the nut_NAME field from nut_ SOURCE record. Delete rem and <*> from rem &oCnuCOmpointercace.nut_SALARY = <*>; and drag the nut_SALARY field from NUT_SOURCE record. Some Points in Component Interface: Every component interface must be based on a component If we want to expose a business process (logic) then we have to expose out component. Through component Interface we can access internal (including peoplesoft) as well as external applications. Multiple component interfaces can reference the same component. I.e. we can expose only one component to a component interface. We cannot expose 2 components to a single component interface. Component interface APIs are used by the other applications to have real time access (synchronous) to peoplesoft component interfaces. While creating a new component interface, we have to identify the name of the source component After that we will be prompted for default properties (records and fileds) If we want we can expose all the records and fields (properties) in the component to the calling program at run time or else we can drag and drop only those records and fields which we want third party to use. Note: Only the objects in the component interface view will be exposed to the calling program at run-time.

Example for your understanding: When ever we add a new employee row in personal data table(while recruiting, once we hire) We want a student table should be populated with a new row by creating a new student id along with employee information. Here two tables are involved (means two components) One is personal data component. Second is student information component. So now we will create a new component interface in application designer by giving name as student

19

profile based on student information component Then we will write save post change peoplecode in personal data component to instantiate, populate and save the component interface object. In the save post change event we will instantiate session object which is API object To get the component interface. (Refer account lock project description) we will use session object whenever we will use integration tools. We will enter new row in personal data table and see in the student information component whether new student id is created or not(testing) Before testing we will give security to the new component interface.

Why should we write in save post change only, why not in other event? Because component interface object data will not be in component buffer and student information component data will not be in component buffer so we are updating/inserting the data in the data base not in the component buffer tables. Whenever we create a component interface ,we will give a name to CI to access.

CONFIGURATION MANAGER

What is Configuration Manager The Configuration Manager is a PeopleTool designed to simplify workstation administration by providing a way to adjust the PeopleSoft registry settings from one central location. With the Configuration Manager you can set up one workstation to reflect the environment at your site, and then you can export the configuration file, which can be shared among all the workstations at your site.

The Configuration Manager contains a variety of setting controls that allow you to set up your workstations for connecting to the database, using workflow, and so on. It enables you to define separate "profiles" for connecting to different PeopleSoft databases. What is Query Manager? Visual representations of your PeopleSoft database, without writing Structured Query Language (SQL) statements. Using the Query Manager we can develop only one object that is Query. Uses of the Query Manager

Display data in a grid for review purpose. We can send the output to the Windows Excel or Crystal reports. For creating the Dimensions in the Cube Manager. We can create the data structure for Peoplesoft nVision. We can create the basic structure of online analytical processing (OLAP) dimensions. Run Query from any PeopleSoft application page. To determine to whom to forward information. This type of query is called role query.

20

Searching the records based on sophisticated search criteria. This type of query is called a
search query, For Creating Views.

21

You might also like