Title | Summary | File | |
---|---|---|---|
Capture Change Ticket Numbers In Oracle Database Audit Streams |
Reconciling database events to ticket numbers is a time consuming manual task that can be easily automated. The solution is to populate the... |
Whitepapers and Presentations | File |
Guide to PeopleSoft Logging and Auditing |
Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy... |
Whitepapers and Presentations | File |
PeopleSoft Data Mover Security |
The Data Mover allows for total manipulation of data within PeopleSoft. You can use it to transfer data among PeopleSoft databases, regardless of... |
Oracle Security Blog | |
PeopleSoft Process Scheduler Security |
When performing a PeopleSoft security audit Integrigy carefully reviews batch processing activity generated through the Process Scheduler. Of... |
Oracle Security Blog | |
PeopleSoft User Security |
When performing a PeopleSoft security audit, reconciling users should be one of the first tasks. This includes default accounts created through... |
Oracle Security Blog | |
PeopleSoft Jolt Security |
Jolt along with Tuxedo supports PeopleSoft web requests. Specifically, Jolt is the layer between the application server and the web server. It is... |
Oracle Security Blog | |
PeopleSoft PUBLIC User Security |
PeopleSoft Public users are not required to authenticate (sign on). These are generic accounts created for specific purposes, for example... |
Oracle Security Blog | |
PeopleSoft Guest User Security |
Being hospitable and welcoming to guests is usually considered good manners. That said, being a gracious host does not mean you should be... |
Oracle Security Blog | |
PeopleSoft Security User Authorization Audits |
When performing a PeopleSoft security audit, reviewing what rights and privileges individual users have been granted for system and application... |
Oracle Security Blog | |
PeopleSoft Logging and Auditing |
Logging and auditing are one of the pillars of PeopleSoft Security. Both application and database auditing is required. Logging and auditing... |
Oracle Security Blog |