Administering User Profiles

This chapter provides an overview of user profiles and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding User Profiles

User profiles define individual PeopleSoft users. You define user profiles and then link them to one or more roles. Typically, a user profile must be linked to at least one role to be a usable profile. The majority of values that make up a user profile are inherited from the linked roles.

Note. It’s possible to have a user profile with no roles. This might be a user who isn’t allowed access to the PeopleSoft application; however, you still want workflow-generated email sent to the user.

You define user profiles by entering the appropriate values on the user profile pages. The user profile contains values that are specific to a user, such as a user password, an email address, an employee ID, and so on.

The user ID and description appear at the top of each page to help you recall which user profile you are viewing or modifying as you move through the pages.

Click to jump to top of pageClick to jump to parent topicSetting Up Access Profiles

This section provides an overview of access profiles and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Access Profiles

Every user profile must be assigned to an access profile, by way of a Symbolic ID. The Access ID consists of an RDBMS ID and a password, and these IDs must have system administrator privileges. Access profiles provide the necessary IDs and passwords for the behind-the-scenes database logon that occurs. Access IDs are used in the following two situations:

Users signing in to the system through PeopleSoft Pure Internet Architecture take advantage of the Access ID that the application server used for connecting to the database.

Access profiles enable you to minimize the number of users who need to know system administrator passwords. In fact, only one person needs to know these passwords. That person can create the required access profiles—by providing the necessary passwords, when prompted—and all other security administrators can simply assign users to the pre-defined access profiles. The Access ID and password are encrypted in the database in the PSACCESSPRFL table.

Before you begin creating your user profiles, roles and permission lists, you first need to set up your access profiles on the database. Ultimately, the access profile is the profile that your users use to connect to your PeopleSoft database. Without being associated with an access profile, users can't sign in, not even with a test ID. This association is by way of the symbolic ID, which is a proxy ID for the Access ID and Access password.

The ID that you use must be defined at the RDBMS level as a valid RDBMS ID possessing system administrator rights. You don’t use PeopleSoft or PeopleTools software to create the RDBMS ID. You need to create it using the utilities and procedures defined by your RDBMS vendor. After you have created the RDBMS ID with system administration authority, then you use the PeopleTools access profiles utility to link your RDBMS ID to the access profile. This is created when you first install your database.

Click to jump to top of pageClick to jump to parent topicUsing the Access Profiles Dialog Box

You manage access profiles using the Access Profiles dialog, which you open from Application Designer by selecting Tools, Miscellaneous Definitions, Access Profiles.

Close

Exit this dialog.

New

Create a new access profile definition.

Edit

Edit an existing access profile definition.

Delete

Delete an existing access profile definition.

Click to jump to top of pageClick to jump to parent topicSetting Access Profile Properties

When you create or modify an Access Profile using the Access Profiles dialog, you need to understand the properties that comprise an access profile. After reading this section, you will be familiar with these properties.

Symbolic ID

The Symbolic ID is used as the key to retrieve the encrypted ACCESSID and ACCESSPSWD from PSACCESSPRFL. For initial installation, you should set it equal to the Database Name.

Access Profile ID

The Access Profile ID must be a valid RDBMS ID with system administrator privileges, and the Access Profile ID must match the associated RDBMS ID. The system assumes that the RDBMS ID that you choose is the same as the Access Profile ID.

The Access ID must be a different logon ID than the User ID. There is logic within PeopleTools such that if Access ID = User ID, PeopleTools does not log off and log on again, nor does the system issue a SET CURRENT SQLID = ‘owner ID’.

DB2 Note. In DB2 terminology, Access ID is the primary ID and Owner ID is a secondary Auth ID. If the Access ID does not equal the owner ID, secondary authorization security exists in DB2 to issue a SET CURRENT SQLID command. DB2 will qualify tables (required) with the Owner ID provided by SET CURRENT SQLID statements issued by the PeopleSoft software. If the access ID equals owner ID, the secondary authorization exits are not required. DB2 will qualify the table name with the access ID.

Access Password

The Access Password is the password associated with your RDBMS ID/Access Profile ID and is the password that the Access ID uses to sign in to the database.

Click to jump to top of pageClick to jump to parent topicWorking with Access Profiles

This section discusses the procedures that you complete while adding, modifying, or removing access profiles in your PeopleSoft system.

To create a new access profile definition:

  1. In PeopleSoft Application Designer, select Tools, Miscellaneous Definitions, Access Profiles.

    The Access Profiles dialog box appears.

  2. Click New.

    The Add Access Profile dialog box appears.

    This dialog box prompts you for the Symbolic ID, name, and password of the new access profile.

  3. Enter a Symbolic ID.

    The Symbolic ID is used as the key to retrieve the encrypted ACCESSID and ACCESSPSWD from PSACCESSPRFL.

  4. Enter an Access Profile ID.

    This ID must be a valid RDBMS ID with system administrator privileges.

  5. Enter and confirm a password.

    The access password is the password string for the RDBMS ID/Access Profile ID. The Confirm Password field required and its value must match that of the Access Password field.

  6. Click OK.

Note. You should use only one Access ID for your system. Some RDBMS do not permit more than one DB table owner. If you create more than one Access ID it may require further steps to ensure that this ID has the correct rights to ALL PeopleSoft system tables.

To change an Access Profile password:

  1. In Application Designer, select Tools, Miscellaneous Definitions, Access Profiles.

    The Access Profiles dialog box appears.

  2. In the Access Profiles: list, highlight the profile that you want to modify, and click Edit.

    The Change Access Profile dialog box appears.

    This dialog box prompts you for the old password, the new password, and then a confirmation of the new password for the access profile.

  3. Enter and confirm the new a password.

    The access password is the password string for the ID. The Confirm Password field is required and its value must match that of the Access Password field.

  4. Click OK.

To delete an Access Profile:

  1. Select Tools, Miscellaneous Definitions, Access Profiles.

    The Access Profiles dialog box appears.

  2. Highlight the access profile that you want to remove, and click Delete.

    You are prompted to confirm the deletion.

    Click Yes at the prompt dialog box if you want to delete the selected access profile.

Important! Make sure you don't delete the only available Access ID or you will not be able to logon to PeopleSoft software in any capacity.

Click to jump to top of pageClick to jump to parent topicWorking With User Profiles

This section discusses how to:

Click to jump to top of pageClick to jump to parent topicCreating a New User Profile

To create a new user profile:

  1. Select PeopleTools, Security, User Profiles, User Profiles to access the Find Existing Values page.

  2. Click Add a New Value.

  3. On the Add a New Value page, enter the new user ID in the User ID edit box, and click Add.

    The user ID can contain up to 30 characters. The name that you specify can't contain any white space, or any of the following characters:

    ; : & , < > \ / " [ ] ( )

    Also, you can't create a user ID named PPLSOFT; this is a reserved user ID used within PeopleTools.

  4. Specify the appropriate values from the pages in the User Profiles component (USERMAINT), and click Save.

Click to jump to top of pageClick to jump to parent topicCopying a User Profile

To copy a user profile:

  1. Select PeopleTools, Security, User Profiles, Copy User Profiles to access the Find an Existing Value search page.

  2. Select the user ID that you want to copy.

  3. On the User Profile Save As page, enter the new user ID, description, and the password that the new user ID should use to sign in to the system.

Click to jump to top of pageClick to jump to parent topicDeleting a User Profile

To delete a user profile:

  1. Select PeopleTools, Security, User Profiles, Delete User Profiles to access the Delete User Profile page.

  2. Make sure that you have selected the correct user profile.

  3. Click Delete User Profile to remove information related to this particular user profile that appears in every security table in the system, PeopleTools, and application tables.

    To prevent any of the information from being deleted, you can specify tables that the delete user process bypasses.

Click to jump to top of pageClick to jump to parent topicSpecifying User Profile Attributes

This section discusses how to:

Click to jump to top of pageClick to jump to parent topicPages Used to Specify User Profile Attributes

Page Name

Object Name

Navigation

Usage

General

USER_GENERAL

PeopleTools, Security, User Profiles, User Profiles, General

Set general user profile attributes.

ID

PSOPRALIAS

PeopleTools, Security, User Profiles, User Profiles, ID

Set ID type and attribute value.

Roles

USER_ROLES

PeopleTools, Security, User Profiles, User Profiles, Roles

Add roles to a user profile. This task defines user access in the PeopleSoft system. Through roles, the user inherits permission lists.

Workflow

USER_WORKFLOW

PeopleTools, Security, User Profiles, User Profiles, Workflow

Specify workflow settings for a user.

Audit

USER_AUDIT

PeopleTools, Security, User Profiles, User Profiles, Audit

Determine when and who last updated a profile.

Links

USER_OTHER

PeopleTools, Security, User Profiles, User Profiles, Links

Display any additional links added.

User ID Queries

USER_QUERY

PeopleTools, Security, User Profiles, User Profiles, User ID Queries

Run queries about a user profile.

Click to jump to top of pageClick to jump to parent topicSetting General User Profile Attributes

Access the General page.

Logon Information

Account Locked Out?

Select this check box to deactivate a user profile for any reason. The user can't sign in until you have cleared this option.

Note. This check box is also automatically selected by the system if you're using password controls and the user exceeds the maximum number of failed logon attempts. The administrator needs to manually open the user profile and clear this check box to reinstate the user.

Symbolic ID

Associated with a user’s encrypted access ID and access password. The correct symbolic ID must be entered to retrieve the appropriate access ID and password. This value determines which access ID and password are used to log the user onto the database after the system validates the user's user ID.

The access ID is required only when a user needs to connect directly to the database (in two-tier). The access ID is not required with the portal or if you use a Lightweight Directory Access Protocol (LDAP) directory server to manage user IDs.

With PeopleSoft Pure Internet Architecture, the application server maintains the connection to the database, so the application server must submit an access ID.

Password and Confirm Password

Enter the user password, which is the password string that the user must supply when signing in. The value in the Confirm Password field must match that in the User Password field.

Note. These values are required to sign on to the system, but you can save the profile without populating these fields.

Expire password at next login

If you are using PeopleSoft password controls, this option enables you to force users to change their passwords in the following situations:

  • The first time that a user signs in to PeopleSoft software.

  • The next time that a user signs in.

  • The first time that a user signs in after the system has emailed the user a randomly generated password.

Note. To use this option, you must enable the Password Expires in 'x' Days PeopleSoft password control.

User ID Aliases

Enables you to use a fully qualified email ID (email address) as a user ID alias. For example, [email protected] could be the user ID used to sign in to the system. The character limit is 70.

Edit Email Addresses

If a user is part of the workflow system or you have other systems that generate emails for users, enter an email address for a user with this link. You can enter multiple email addresses for a user, but one must be selected as the primary email address. The system allows only one email address per type. For example, you can't enter two home email addresses.

The Email Addresses interface has the following controls:

  • Primary Email Account: If you enter multiple email accounts, one must be selected as the primary account.

  • Email Type: Select from Blackberry, Business, Home, Other, or Work.

    The Blackberry email type is used with the Workflow/RIM technology.

  • Email Address: Enter the email address in this edit box.

General Attributes

Language Code

The language code on the User Profile page has a limited use. For example, when a user runs a batch job, the system needs to know in which language to generate the reports for the user who submitted the job.

In Pure Internet Architecture, the user’s language preference is based on the selection that the user makes on the signon page.

For Microsoft Windows workstations, the user’s language preference is derived from the Display tab in PeopleSoft Configuration Manager. For the Microsoft Windows environment, the value specified as language code in the user profile acts as a default in case the language code isn’t specified in PeopleSoft Configuration Manager.

Currency Code

If the user deals with international prices, set the currency code to reflect the native or base currency. This enables values to appear in the currency with which the user is familiar.

Default Mobile Page

Select the mobile homepage that should appear after users sign on to their mobile device.

Enable Expert Entry

You can specify that some users, such as your expert or power users, have the option of deferring all processing of the data that they enter. This enables users to reduce the amount of trips to the server for data processing, regardless of how the developer set field deferred or interactive processing. You enable this option in a component in Application Designer, and you specify which users have this option using the Enable Expert Entry check box.

If you want a particular user to be able to specify deferred processing, select the check box. If not, leave the check box clear.

Permission Lists

Navigator Homepage

Associated with PeopleSoft Workflow.

Process Profile

Contains the permissions that a user requires for running batch processes through PeopleSoft Process Scheduler. For example, the process profile is where users are authorized to view output, update run locations, restart processes, and so on.

Note. Only the process profile comes from this permission list, not the list process groups.

Primary and Row Security

The system determines which data permissions to grant a user by examining the primary permission list and row security permission list. Which one is used varies by application and data entity (employee, customer, vendor, business unit, and so on). Consult your application documentation for more detail.

The system also determines mass change (if needed), and definition security permissions from the primary permission list.

Click to jump to top of pageClick to jump to parent topicSetting ID Type and Attribute Value

Access the ID page.

ID Types and Values

ID Types and Values

Select the ID type and attribute value. Separating user profiles by ID type enables you to have multiple categories of user profiles with ID numbers all within a range of 1–1000, for example, and it also enables you to grant data permission by entity (customer, employee, and so on). So when users sign in to your benefits or payroll deductions application, they see only information that applies to them.

A user profile is a set of data about an entity—a user—that interacts with the system. The human resources (HR) system, which keeps track of your employee data, is designed to focus more on your employee user types. On the other hand, your financials system is designed to keep track of customer and supplier user types. ID types enable you to link user types with the records that are most relevant when a user interacts with the system.

The Attribute Value field is where you select the value associated with the attribute name. In this case, the value reflects the employee number, but it could be a customer number or vendor number.

User Description

The User Description section enables you to help identify the user.

Description

You can add a description, such as a name of an individual or an organization, for the user profile.

Set Description

Click this link to populate the edit box with an existing description in the database.

Note. Before you assign a user type to a user, you must create user types.

See Also

Working With User Profile Options

Click to jump to top of pageClick to jump to parent topicSetting Roles

Access the Roles page.

Role Name

Displays the name of the role added to the user profile.

Description

Displays a description of the role added to the user profile.

Dynamic

Selected if the system has assigned a particular role dynamically.

Route Control

For each role assigned to a user, you can specify a route control profile. For example, suppose that you have a role named EXPENSE_REP. If you wanted a particular expense representative to handle all of the expense reports submitted by people who had last names beginning with A, you could assign the user a specific route control profile to send the user reports submitted by individuals with a last name beginning with A.

View Definition

Enables you to view the role definition associated with this user profile.

See Understanding Route Control Development.

Dynamic Role Rule

Use the Dynamic Role Rule options to test and manually carry out business rules for dynamically updating roles and assigning them to user profiles. You design your role rules using Query Manager, PeopleCode, or LDAP directory rules

Execute on Server

Select the Process Scheduler server that should run your role rule.

Test Rule(s)

Use this button to test the rules and verify if they're going to produce the desired results for a particular user. None of the roles are actually assigned, but the system provides you a report as to what roles will be assigned when you run the rule.

Execute Rule(s)

Use this button to run the rules and assign the appropriate roles to a particular user. This is the manual approach. Typically, you implement role rules through PeopleSoft Process Scheduler on a regularly scheduled basis.

Process Monitor and App Msg Monitor (application message monitor)

Enables you to view the status of the process carrying out your role rule and the application messages that the process invoked.

Managing High Volume Dynamic Role Updates

Depending on the number of users who are authorized to run dynamic role updates, the times when they do so, and the organization of your PeopleSoft system, dynamic role updates can experience slow performance, deadlocks, or failure to assign some roles. This is especially true when large numbers of roles are being updated.

If you anticipate that dynamic role updates on your PeopleSoft system will involve large amounts of data, you can reconfigure the DYNROLE_PUBL Application Engine program which performs the updates, so that it uses alternate versions of the associated PeopleCode, message, and channel to chunk the role data into more manageable pieces.

Important! You must reconfigure DYNROLE_PUBL on all nodes that will participate in dynamic role updates, so that they all use the same PeopleCode, message, and channel.

To reconfigure the DYNROLE_PUBL Application Engine program:

  1. In PeopleSoft Application Designer, open the DYNROLE_PUBL Application Engine program definition.

  2. Deactivate the program step labeled Dynamic Role Assignment.

    The PeopleCode associated with this step uses the ROLESYNCH_MSG message and the ROLESYNCH_CHANNEL channel to accomplish non-chunked dynamic role updates. Clear the Active check box for this step.

  3. Activate the program step labeled DynRole Assignment – Ext.

    The PeopleCode associated with this step uses the ROLESYNCHEXT_MSG message and the ROLESYNCHEXT_CHANNEL channel to accomplish chunked dynamic role updates. Select the Active check box for this step.

  4. Save and close the Application Engine program definition.

  5. Ensure that the ROLESYNCHEXT_MSG message is active.

    Open the ROLESYNCHEXT_MSG message, access its properties, and select the Use tab. The status should be Active, and the message channel should be ROLESYNCHEXT_CHANNEL.

  6. Save and close the message definition.

  7. Shut down your application server and Process Scheduler.

  8. Purge your PeopleSoft cache directories.

  9. Restart your application server and Process Scheduler.

Click to jump to top of pageClick to jump to parent topicSpecifying Workflow Settings

Access the Workflow page.

Workflow Attributes

Alternate User ID

Select an alternate role user to receive routings sent to this role user. Use this option when the role user is temporarily out (for example, on vacation or on leave).

If the edit box contains a role user name, the system automatically forwards new work items for whoever is assigned as the current role user to the alternate role user.

Note. The system forwards new work items to the alternate role user. It doesn’t reassign items already in the user’s worklist. To reassign the existing work items, access the Role User Archiving component.

From Date and To Date

Enter the date on which the current role user is going to begin and return from a temporary vacancy. This edit box specifies the time period that the alternate user ID is used.

Supervising User ID

Select the user ID of the user’s supervisor from this drop-down list box. The system uses this value when it needs to forward information to the user’s supervisor.

The system uses the PERSONAL_DATA record to determine the user’s supervisor.

Note. If you’re using PeopleSoft Human Capital Management (PeopleSoft HCM) applications, this field shouldn’t appear. If it does, you must set your workflow system defaults.

Routing Preferences

Specify which types of routings this role user can receive. The Routing Preferences box shows the two places where the system can deliver work items: to a worklist or to an email mailbox. If the user doesn’t have access to one or both of these places, clear the check box. For example, if this person isn’t a PeopleSoft user, clear Worklist User.

Reassign Work

Re-assign Work To

Use to reassign pending work for this role user if positions change or a user is temporarily out, such as on leave or on vacation.

If this user has work items waiting (as shown by the Total Pending Worklist Entries in your Workflow interface), select this check box and select the user to whom work items should be forwarded from the drop-down list box. When you save the page, the system reassigns existing worklist entries to the specified user.

Note. If you don’t reassign pending work items, they remain unprocessed.

Total Pending Worklist Entries

Displays worklist items that require a user's attention.

See Also

Defining Roles and Users

Click to jump to top of pageClick to jump to parent topicInquiring About User Profile Audit Information

The Audit page is a display-only page that enables you to determine:

Click to jump to top of pageClick to jump to parent topicDisplaying Additional Links

If you added links for user profiles in the Security Links component, they appear on the Links page.

See Also

Administering Security from Applications

Click to jump to top of pageClick to jump to parent topicRunning User ID Queries

User ID queries enable you to run queries that provide detailed information regarding a user profile, such as the permission lists and roles associated with a user profile. The available queries are documented on the page.

To run a user ID query:

  1. Click the link associated with the query that you want to run.

    This invokes a new browser window.

  2. View the information that the query returns to the new browser window, or select a download option.

    For downloading, you have the following options:

Click to jump to top of pageClick to jump to parent topicImplementing Distributed User Profiles

This section provides an overview of distributed user profiles and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Distributed User Profiles

As your user population increases in size, it can become impractical for one person to centrally administer all of your system's user profiles. You can distribute some or all user profile administration tasks by enabling selected users to use the Distributed User Profiles component (USERMAINT_DIST) to control the granting of selected roles to other users.

The pages in the Distributed User Profiles component are identical to the corresponding pages in the User Profiles component, except that its User Roles page doesn't include links for editing the assigned roles. You can restrict who can use the component, which users they can administer, and what roles they can grant, based on the roles to which they themselves belong. For example, you might specify that users in the Line Manager role can grant the Shipping Clerk role to other users. The effect of this is to designate line managers as remote security administrators who can administer the user profiles of shipping clerks. In addition to granting and managing roles, a remote security administrator can administer all parts of a user profile, including passwords, email addresses, and workflow.

Important! Distributing user profile administration might affect regulatory compliance (for example, Sarbanes Oxley). You are responsible for determining and accounting for any impact of using this feature.

To implement distributed user profiles:

  1. Use permission lists and roles to configure security to give your selected remote security administrators access to the Distributed User Profiles component.

    Note. The PIA navigation path to this component is PeopleTools, Security, User Profiles, Distributed User Profiles.

  2. Use the Set Distributed User Profile Search Record page to define which user profiles can be administered with the Distributed User Profiles component.

    See Defining User Profile Access for Remote Security Administrators.

  3. Use the Role Grant page in the Roles component (ROLEMAINT) to specify which roles your remote security administrators can grant with the Distributed User Profiles component.

    See Defining Remote Security Administrator Role Grant Capability.

Click to jump to top of pageClick to jump to parent topicDefining User Profile Access for Remote Security Administrators

To define user profile access:

  1. Define a search record that returns only the user IDs that you want remote security administrators to be able to administer.

    Note. Initially, PSOPRDEFN_SRCH is the default search record for this purpose. You can accept the default and skip this step, but that enables access to every user profile on your system. You're strongly encouraged to define a search record that's more restrictive.

    See PeopleTools 8.46 PeopleBook: PeopleSoft Application Designer, "Creating Component Definitions," Understanding Search Records

  2. In a browser, select PeopleTools, Security, User Profiles, Distributed User Setup to access the Set Distributed User Profile Search Record page.

  3. In the New Search Record field, select the search record that you defined in step 1, then save.

    When remote security administrators access the Distributed User Profiles component, this search record enforces row-level security to restrict the set of user IDs that they can select and administer.

See Also

Understanding Search Records

Click to jump to top of pageClick to jump to parent topicDefining Remote Security Administrator Role Grant Capability

In a browser, select PeopleTools, Security, Permissions and Roles, Roles, Role Grant to access the Roles - Role Grant page.

You use this page to specify which roles can be granted using the Distributed User Profiles component, and which users can grant them. This page is part of a role definition — you can configure this role to be a remote security administrator, or to be a role that a remote security administrator can grant to users, or both.

Roles That Can Be Granted By This Role

By specifying one or more roles for this field, you effectively designate users who belong to this role — and who have access to the Distributed User Profiles component — as remote security administrators. Add rows to enable this role to grant as many roles as appropriate. For example, you might want users that belong to the Shipping Manager role to be able to grant the Shipping Clerk (Temporary) role and the Packing Clerk (Temporary) role to other users.

Note. This field is complementary to the Roles That Can Grant This Role field, and propagates its values accordingly. Using the example given, on the Role Grant page for the Shipping Clerk (Temporary) role and the Packing Clerk (Temporary) role, the Roles That Can Grant This Role field now specifies Shipping Manager.

Roles That Can Grant This Role

By specifying one or more roles for this field, you effectively designate users who belong to those roles — and who have access to the Distributed User Profiles component — as remote security administrators, able to grant this role to users. Add more rows to enable additional roles to grant this role. For example, you might want users that belong to the Security Administrator role to be able to grant the Shipping Manager role to other users.

Note. This field is complementary to the Roles That Can Be Granted By This Role field, and propagates its values accordingly. Using the example given, on the Role Grant page for the Security Administrator role, the Roles That Can Be Granted By This Role field now specifies Shipping Manager.

View Definition

Click to view the associated role definition and ensure that you've selected the appropriate role to grant or to serve as a remote security administrator.

Click to jump to top of pageClick to jump to parent topicAdministering Distributed User Profiles

In a browser, select PeopleTools, Security, User Profiles, Distributed User Profiles to access the Distributed User Profiles component.

Remote security administrators can fully edit the user profiles that they access through the Distributed User Profiles component, including granting roles.

The users that remote security administrators can administer are determined by the search record you specified on the Set Distributed User Profile Search Record page.

The roles that a given remote security administrator can grant are determined by the selections that you made on the Roles - Role Grant page.

See Also

Specifying User Profile Attributes

Click to jump to top of pageClick to jump to parent topicWorking with Full User Profile Synchronization

PeopleSoft provides the ability to synchronize users between an 8.1x database and an 8.4x database or between two 8.4x databases using the USER_PROFILE application message.

This section discusses how to:

Click to jump to top of pageClick to jump to parent topicConfiguring Full User Profile Synchronization

To set up full user profile synchronization, you use PeopleSoft Integration Broker to configure one database to send user profile data and another database to receive user profile data. The Application Engine program User_Sync accesses profiles on the sending database through the USER_PROFILE_SYNC component interface. After the User_Sync program opens up the profiles through the USER_PROFILE_SYNC component interface, it publishes the USER_PROFILE application message. After publication, the User_Sync program enables the component interface to send the application message to the receiving database.

To set up full user profile synchronization:

  1. Set up PeopleSoft Application Messaging for 8.1 databases and PeopleSoft Integration Broker for 8.4 databases.

    Important! For Full User Profile synchronization to function properly, you must set up PeopleSoft Application Messaging for 8.1x databases and PeopleSoft Integration Broker for 8.4x databases.

    See Enterprise PeopleTools 8.46 PeopleBook: PeopleSoft Integration Broker.

    See PeopleTools 8.14: Application Messaging.

  2. Give permission to the methods on the USER_PROFILE_SYNC component interface.

  3. In PeopleSoft Integration Broker, set up the 8.4 node Transactions for the USER_PROFILE message.

    See Setting Up USER_PROFILE Transactions.

  4. Set up and run the User_Sync Application Engine program.

    See Setting Up the User_Sync Application Engine Program.

Click to jump to top of pageClick to jump to parent topicSetting Up USER_PROFILE Transactions

Select PeopleTools, Integration Broker, Node Definitions. Open the appropriate node and select the Transactions tab.

Configure transactions to send and receive user profiles using the following:

Click to jump to top of pageClick to jump to parent topicSetting Up the User_Sync Application Engine Program

The User_Sync Application Engine program synchronizes user profiles between databases using the USER_PROFILE application message. You set up this program on the database that you configured to send user profile information. Once you have set up the program, click Run.

To set up this program, select PeopleTools, Application Engine, Process.

Create a new request using the following configuration:

Click to jump to top of pageClick to jump to parent topicWorking With Passwords

This section discusses how to:

Click to jump to top of pageClick to jump to parent topicSetting Password Controls

Select PeopleTools, Security, Password Configuration, Password Controls to access the Password Controls page.

You use the Password Controls page to set any password restrictions such as duration or minimum length of a password that you might want to impose on your end users. These options apply when you are maintaining your user profiles within PeopleSoft, not within a directory server.

Enable Signon PeopleCode

Select this check box to enable the following PeopleSoft password controls: Age and Account Lockout. The other password controls are not enabled by this box.

If you do not want these password controls, as in you already have a third-party utility that performs equivalent features, clear this check box.

Note. You can extend or customize the controls by modifying the PeopleCode.

Age

You define a number of days (between 1 and 365) that a password is valid. To do this, select the Password Expires in ‘N’ Days option. Users logging on after a password expires must change their password to log on. If you don't want the password to expire, then select Password Never Expires. When a password expires the user can't sign in to the system and is prompted to change it.

If you want to specify a duration in which the system warns users that their password is about to expire, you have the following options:

  • If you want to specify a warning period, select Warn for 'N' days, and enter the number of days in the edit box.

  • If you don't want any warning period, select Do not warn of expiration.

PeopleSoft delivers a default permission list named PSWDEXPR (Password Expired). When a password expires for a user, the system automatically removes all of the user's roles and permission lists and temporarily assigns them the PSWDEXPR permission list only.

A user whose password has expired can access only items in the PSWDEXPR permission list, which typically grants access to the Change Password component (CHANGE_PASSWORD) only. For the duration of the session, as in until the user changes the password, the user is restricted solely to the PSWDEXPR permission list.

Note. The actual user profile stored in the database is not changed in any way when the password expires. You don't need to redefine the profile. When the password is changed the system restores the user profile's previous roles and permission lists.

Account Lockout

This control enables you to lock an account after n number of failed logon attempts. For example, if you set the Maximum Logon Attempts value to 3, and a user fails three logons, they are automatically locked out of the system. Even if they correctly enter a user ID and password on the fourth attempt, the user is not permitted to logon. This feature reduces the risk of any intruders using brute force to break into your system. It also provides a reminder to users to remember the passwords they chose.

After the account is locked out, a system administrator needs to open the user profile and clear the Account Locked check box manually.

Miscellaneous

The Allow password to match User ID control enables administrators to make sure users don't use their own user ID as a password. This helps you to prevent hackers from guessing passwords based on a list of employee names.

Minimum Length

Administrators can opt to set a minimum length for passwords maintained by the PeopleSoft system. If the minimum length is set to 0, the PeopleSoft password controls do not enforce a minimum length on the user’s password. This does not, however, imply that the password can be blank. When you create a new user or a user changes a password, the system checks this value. If it is not zero, the system tests the password to ensure it meets length requirements, and if not, an error message appears.

Character Requirements

Administrators can require a set number of digits or special characters within a password. Special characters refer to symbols such as # and @, and digits refer to numbers (integers), such as 1 or 2.

Here is the list of special characters you can include within a password:

! @ # $ % ^ & * ( ) - _ = + \ |[ ] {} ; : / ? . > <

Purge User Profiles

This setting enables you to purge the system of user profiles that have not been used in a specified amount of time. If you maintain user profiles in a directory server, a row is added to the PSOPRDEFN table for the system to access while the user interacts with the system. However, whenthe user is deleted from the directory server, you must also delete the row in PSOPRDEFN associated with the deleted user profile.

 

Note. The Application Engine program that performs this operation is named PURGEOLDUSERS.

Click to jump to top of pageClick to jump to parent topicChanging Passwords

The PeopleSoft system enables users to change their passwords as needed.

To change a PeopleSoft password:

  1. From the portal navigation pane, select Change My Password.

  2. On the Change Password page, enter the current password in the Current Password edit box.

  3. In the New Password edit box, enter the new password.

  4. Confirm the new password by entering it again in the Confirm Password edit box.

  5. Click Change Password.

Click to jump to top of pageClick to jump to parent topicCreating Email Text for Forgotten Passwords

Before the system emails a new, randomly generated password for a forgetful user, you want to make sure they are who they claim to be. The Forgotten Password feature enables you to pose a standard question to users requesting a new password to verify the user's authenticity. If the user enters the appropriate response, then the system automatically emails a new password.

When a user has forgotten a PeopleSoft password, the system sends the user a new password within an email message. You can have numerous password hints, but typically, you send all new passwords using the same email message template. Because of this, PeopleSoft provides a separate page just for composing the standard email text that you use for your template:

Add the following text string in the Email Text edit box:

<<%PASSWORD>>

This is where the system inserts the new password. The %PASSWORD variable resolves to the generated value.

Note. You might instruct the user to change the password to something easier to remember after they sign on to the system with the randomly generated password. Only users that have the Allow Password to be Emailed (on the General page) option enabled in a permission list can receive a new password using this feature.

Click to jump to top of pageClick to jump to parent topicCreating Hints for Forgotten Passwords

Select PeopleTools, Security, User Profile, Forgot My Password Hint to access the Forgot My Password Hint page.

With these hints set up, users, upon forgetting their password, access the Forgot My Password page. The user answers the question correctly and gets a new password sent through your email system.

Users don't have to use the password question created by an administrator. If they would like to add their own password question, they can do so in the My System Profile component (USERMAINT_SELF).

To create a forgotten password hint:

  1. Click Add a New Value.

  2. On the Add a New Value page, enter a three-character ID in the Password Hint ID edit box.

  3. Click Add.

  4. Select the Active check box.

  5. Enter your question to verify that the user is who he or she claims to be.

  6. Click Save.

Click to jump to top of pageClick to jump to parent topicDeleting Hints for Forgotten Passwords

To delete a password hint:

  1. Select PeopleTools, Security, User Profiles, Delete Forgotten Password Hint.

  2. Enter the specific code for the hint or perform a search for it.

  3. On the Delete Forgot My Password Hint page, select the appropriate hint.

  4. Click Delete.

Click to jump to top of pageClick to jump to parent topicSetting Up the Site for Forgotten Passwords

PeopleSoft recommends setting up a site specifically designed for users who have forgotten their passwords. This site would require no password to enter, but provides access only to the forgotten password pages.

To set up a forgotten password site:

  1. Set up a separate Pure Internet Architecture site on your web server.

  2. Set up a direct connection to the site, as in a link that leads right to it.

  3. In the web profile, enable public access and specify a public user ID and password for automatic authentication.

    This “direct” user should have limited access, as in only to the Email New Password component. Users go directly to it, and get a new password mailed.

  4. Place a link to the forgotten password site within the public portion of the PeopleSoft portal, or on another public website.

  5. Notify your user community of the link.

Click to jump to top of pageClick to jump to parent topicRequesting New Passwords

Access the Forgot My Password page, which is a hidden page.

If a user forgets a password, you can opt to have the system randomly generate a new password and email it to the forgetful user. If the Allow Password to be emailed setting is not included in a user's permission lists, the user is not allowed to receive a new password through email.

If a user is allowed to receive new passwords through email, the user can request a new password..

Before the system can email the user a new password, the user must have the following in place:

To request a new password:

  1. Click the Forgotten Password link on the PeopleSoft signon page.

  2. On the Forgot My Password page, enter your user ID.

  3. Click Continue.

  4. On the Email New Password page, make sure that the system is set to send the new password to the appropriate email address.

    If the appropriate email address does not appear, contact your system administrator. System administrators must make sure that the email address is correctly represented for each user who intends to use this feature.

  5. Respond to the user validation question.

  6. Click Email New Password.

Click to jump to top of pageClick to jump to parent topicWorking With User Profile Options

This section provides an overview of user profile types and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding User Profile Types

When deploying your applications to the internet, you have the potential to generate thousands of different user profiles. In some situations, it may be necessary to aggregate your user profiles in a categorical fashion. For example, having ID types enables you to have employee ID numbers beginning at 1 as well as customer ID numbers beginning at 1.

User profile types also provide a means to link user profiles with data stored in application specific records. PeopleSoft applications need this link mostly for self-service transactions. For example, you want employees to see just their own benefits, or you want customers to view and pay their own bills. Customer ID, Employee ID, and so on are the keys for the application data. User profile types enable the system to find the correct ID based on the user profile. The system needs the value because there’s no guarantee that personal data and vendor contact data won’t have the same key field. Because the personal data and vendor contact data resides in different records, there’s no edit that prevents the two records from having the same key.

PeopleSoft delivers the following profile types:

ID Type

Description

BID

Bidder

CNT

Customer Contact

CST

Customer

EJA

External Job Applicant

EMP

Employee

NON

None

ORG

Organization ID

PER

Person (CRM)

VND

Vendor

PTN

Partner

Click to jump to top of pageClick to jump to parent topicDefining User Profile Types

Select PeopleTools, Security, Security Objects, User Profile Types to access the User Profile Types page.

ID Type

The ID type is the abbreviated form the profile type name.

Description

The Description edit box enables you to add an intuitive name for a profile type. This is the value that appears on the ID Page in the User Profiles component. There's a 30-character limit.

Enabled?

You disable and enable a profile type by selecting this check box. Once enabled, you can assign it to user profiles. If it is disabled then it does not appear in the drop-down list box on the ID page for user profiles.

Note. Don't enable the ID type until the fields and tables in the Field Information section have been defined and built with Application Designer.

Sequence Number

This option is used by the Set Description function. On the User Profiles, ID page you can click a Set Description link to generate the user description based on the values in the Description field name for the user types assigned to the user. The sequence number determines which user type to use when the user is assigned to multiple user types. The user description is set to the value in the Description field name of the user type with the lowest sequence number and nonblank value. For example, if a user is assigned to user types of Employee (seq no 1) and Customer Contact (seq no 3), the description would be set to PERSONAL_DATA.NAME, unless it is blank. If PERSONAL_DATA.NAME is blank, the description would be set to CONTACT.NAME1.

Note. For user types with multiple fields, the system uses the Description field name corresponding to the last field. For example, the Customer Contact user type has two fields: SETID and CONTACT_ID. The Set User Description function uses the Description field name CONTACT.NAME1 corresponding to the last field, CONTACT_ID.

Description (Long)

The Description edit box provides an opportunity to provide details about a given profile type. There's a 250-character limit.

Field Information

The fields that you select enable the User Profiles component to prompt for an ID value when you select a type on the ID page. Let’s say that the user selects Employee from the ID page. In this case, the system needs to know the valid ID values to prompt the user with. The Edit Table column specifies the record, the Field Name column specifies the field. You can specify multiple fields if the ID has multiple keys, as in when the keys for customer information are Customer ID and SETID.

Click to jump to top of pageClick to jump to parent topicPreserving Historical Profile Data

There are many occasions when you need to delete a user profile from your system. For example, perhaps an employee retires or an employee leaves the organization. Regardless of the situation, you don't want to keep the unnecessary user data in your system. It's a good idea to purge your system of obsolete user data, such as personal queries, to reclaim space for new user data. This process targets all tables that are keyed by user ID.

However, in the case of an employee, you may not want to keep their page or signon access information in the system, but you might be interested in keeping user data stored in an audit table that tracks changes made to vital company data. You may need to check that information a few months later as you might discover some interesting financial allocations, and if so, you'll want to know who's responsible.

Note. Keep in mind that the automated process of deleting a user profile deletes every row of data in your system associated with a particular user profile. You want to make sure that any information you might need in the future is safe.

Select PeopleTools, Security, Security Objects, Tables to Skip to access the Bypass Tables page.

To preserve a table that stores data associated with user profiles, add a row to the Bypass Tables page and select either a PeopleTools security table or a PeopleSoft application security table from the Record (Table) Name drop-down list box.

Click to jump to top of pageClick to jump to parent topicTransferring Users Between Databases

You'll occasionally need to copy security information from one database to another. Typically, you’ll do this as part of an upgrade or to transfer security information from your production environment to your development or testing environment. PeopleTools provides a set of Data Mover (DMS) scripts designed to export and import your security information. The provided scripts transfer user profiles from a source to a target database.

Note. Application Designer's upgrade feature offers upgrade support for both Roles and permission lists.

There is one script to export User Profile data from the source database. The source database refers to the database that contains the User Profiles that you want to migrate. The target database refers to the database to which you are copying the user information.

After exporting the security information from the source database, you then run the import script against the target database. The target database refers to the database to which you want to transfer the security data. The scripts involved in transferring security information from one database to another appear in the following list:

You will find this set of scripts in PS_HOME\scripts.

This section describes the procedure for running these scripts, and it outlines what needs to be in place prior to running the scripts. It also presents some items to consider prior to running the scripts.

Considerations

Before running scripts to export and import your security information, you should consider these topics:

Running the Scripts

Complete the following procedure to run the user transfer scripts.

To run the scripts

  1. Using Data Mover, sign on to the source database and run USEREXPORT.DMS for user definitions.

    You can edit this script to specify the location and file name of the output file and the log file.

  2. Using Data Mover, sign on to the target database and run USERIMPORT.DMS for user definitions.

    You can edit the script to specify the location and file name of the input file and the log file. The name and location of the input file must match the output file you specified in step 2.

  3. After copying user and role definitions, it is recommended that you run the PeopleTools audits.

    This includes DDDAUDIT and SYSAUDIT to check the consistency of your database.

Click to jump to top of pageClick to jump to parent topicTracking Users' Sign-in and Sign-out Activity

PeopleSoft Security provides two audit logs which track users' sign-in and sign-out activity in PeopleSoft. Signin activity includes timeouts, browser closings, and browser freezes.

Access these logs by navigating in a browser to PeopleTools, Security, Common Queries, Access Log Queries. Select one of the following logs:

These logs are generated using data from the PSACCESSLOG table. If you are not interested in employing this functionality, delete the PSACCESSLOG table. Deleting this table does not cause any negative impact.

Note. If you deleted the PSACCESSLOG table and would like to track Users' sign-in and sign-out activity again, you must recreate the table using the same exact column names and order as were in the previous PSACCESSLOG table: OPRID, LOGIPADDRESS, LOGINDTTM, LOGOUTDTTM.