Sunteți pe pagina 1din 20

APPLICATION DESIGNER

What is an Application Designer?


Application Designer is an integrated development and upgrade tool that contains collection
of related object definitions, these objects are useful for specific purpose means using this
objects we can develop projects according to the user requirements.

What are the 8 Development Steps?


8 steps in Developments steps

Design the Application.


Create Field Definition
Create Record
Build the Record
Design the Page
Create Component
Enable Navigation.
Test the Application

Difference between upgrade and development view?


In Development view we will create or modify many types of definitions but in the upgrade view
we will have only those definitions that are available for upgrade.

How many types of tables are there in database and what are their differences?
1. System Catalog Tables
2. People Tools Tables
3. Application Data Tables

System Catalog Tables: System Catalog Tables stores physical attributes of the tables and
views. Naming convention for these tables is SYS.

PeopleTools Tables: The objects that we develop using the People Tool Objects are saved in
PeopleTools Tables. Naming convention for these tables prefixed with PS. Once a field is
created it would be stored in PSfield definition table, once a record is created it would be stored
in PSrecdef. (Only definition/structure is stored)

Application Data Tables: stores the data, which is entered by the user through PeopleSoft
application windows and pages. Naming convention for these tables is PS_.
Application Data Tables are divided into 2 types:
1. Control Tables
2. Transaction Tables

Control Tables: Define the company structure and processing rules.


Transaction Tables: These are tables used to record our day-to-day transactions, such as
personal data about employees.

What is a prompt table?


Prompt tables are the most common methods for validating data entry in peoplesoft
applications. This is like application data table the only difference is that it stores values that
other tables can validate against. Prompt table is a control table. (Country table and Company
1
table)

What is a Translate Table where are the Translate table values are stored?
It will store values for fields that don't require an individual prompt table, It is also known as
XSLT table. The data we store in the translate table does not change often. Each database
contains one translate table. (blood types, days of the week)

Structure of the Translate Table (PSXLATITEM)


Field Name Description
FIELDNAME Field name, such as ABSENCE_TYPE
LANGUAGE_CD Language code
FIELDVALUE Value for the field
EFFDT Effective date
VERSION Internal version number (system-maintained)
EFF_STATUS Status—active or inactive
XLATLONGNAME 30-character description; used as a label on pages and
reports
XLATSHORTNAME 10-character description; used as a label on pages and
reports
LASTUPDDTTM Date Time field showing the last time that a field was updated
LASTUPDOPRID User ID of the user who most recently updated the field

How many table edits are there in Record field properties?


1. Prompt Table With Edit
2. Prompt Table No Edit
3. Translate Table
4. Yes/No Table Edit
Prompt Table No Edit: Provides List of Suggested values, which users cannot edit.
Prompt Table With Edit: Users can edit the contents of the field against the values that are
maintained in the specified prompt Table.
Translate Table Edit: Which is nothing but a translate table created by developer.
Yes/No Table : I n some situations we want the user to enter only Boolean values like yes or
no, true or false in this situation we will use yes no table. The Translate Table for ex:
PSYESNO. When you select the Yes/No Table Edit, the system automatically points to the
PSYESNO field in the Translate Table

Difference between prompt table with edit and No Edit?


Prompt Table No Edit: Provides List of Suggested values, which users cannot edit.
Prompt Table With Edit: Users can edit the contents of the field against the values that are
maintained in the specified prompt Table.

What is effective date?


Date on which a table row becomes effective, the date that an action begins. For example, if
you want to close out a ledger on June 30, the effective date for the ledger closing would be
July 1. This date also determines when you can view and change the information. Pages or
panels and batch processes that use the information use the current row. Effective date enables
us to keep historical, current, and future information in tables. There are three types of effective
2
dates: Current, History and Future.

What is effective status?


EFF_STATUS usually accompanies EFFDT. For example in Department table suppose we
inactivated one dept from so and so future EFFDT, from that future date onwards this dept is
going to be inactivated, after that whenever we click the link prompt button of dept id field we
can see only active departments.

What is effective sequence?


Whenever we want to enter more than one transaction on the same day for an employee like
promotion and salary hike we will use effective sequence. Effseq number starts with 0

How many Actions are there in the Component Properties dialog (Use Tab)?
Add: Used to add a new high-level key, such as a new employee ID or a new customer. Except
in the case of effective dating Add is used to insert new current row or update future rows. If we
select only Add action then we can’t modify the existing rows. (Doesn’t have any effect with
EFFDT)
Update/Display: Used to update existing rows only.
Update/Display All: Used to update current and future rows in an effective dated record. Only
used with effective dated records.
Correction: Used to update any rows (history, current and future) in an effective dated record.
Only used with effective dated records.
Data Entry: Not supported in PeopleSoft Internet Architecture

What is the difference between Key and Duplicate Key?


Whenever a field is a key field we cannot have duplicate values in that field. Key is used to
identify the field as the search criterion that uniquely identifies each row.
Duplicate values are allowed, for example in composite keys like if we have 4 fields at least one
field should be unique ex: in job table emplid, emplrcd, effdt and effseq

What is from search key and through search key in Record properties?
From search key: Gives the values from the specified value to the max values
For ex: if we have to search values after emplid of 100 to the max then we should enter 100 in
the from search key. (total values to be displayed are 300 values)
Through search key: gives values from the given value – 300 values.

What is the difference between key and search key and also alternate search key?
Keys determine the structure that makes a row of data unique. A key may also be a search key,
which makes the field appear on search pages to help users locate rows of data. Alternate key
are only used for search pages and have nothing to do with the table structure. Alternate search
key provides an alternate path into the table data. It will appear to the user whenever he clicks
advanced search option.

How many types of tables are there? Define them?


SQL Table: A physical SQL Table present in the database, this is the default.
SQL View: Not a physical SQL Table but corresponds to a view written in SQL referring one or
more fields from different tables. This gives a filtered view of information stored in tables. Stored
in the database as a view. (Query view is system generated and SQL views are created by
developer) whenever you modify a record you need to take care: check if any views are
dependent on this record.
3
Dynamic view: A record definition that can be used like a view in pages and People Code but
is not stored as a SQL view in the database. Dynamic views provide superior performance.
Derived/Work: We can use it to calculations. It is not an object, and also we can use it as a
funclib. A temporary workspace to use during online page processing. A derived or work record
is not stored in the database, so no need to build it.
Sub Record: Group of fields used in multiple records like companies having address data of
employees. If you have to use the same fields in different record definitions, then we will store
all those fields in a subrecord and add this subrecord as a field to the record definitions. Stored
in the database.
Query View: using the PeopleSoft Query we don’t need to write a query it will automatically
generate by dragging and dropping. This is a two tier tool and runs through application designer
and produces SQL dependent upon the host RDBMS.
Temporary Table: we will do all the manipulations on the data present in the temporary table.
Increases the performance, as it is not stored in the database. Used mainly for the AE batch
processes.

What is a dynamic view? Where we can use dynamic View?


It can be used like a view in pages and people code but not stored in database as a sql view,
instead the system uses the view text as a base for the sql select that is performed at runtime.
These views shows superior performance in some situations such as search records and
people code selects.

What is difference between SQL View and Dynamic View?


SQL views are written against the RDBMS catalog tables. Dynamic view is declared only to
people tools and not to the system catalog. SQL views are not recommended for performance
tuning as they run against the database. Dynamic views improve performance. SQL views
reside in the database dynamic views are not.

Advantages of Using Search Views instead of Search Table


As the search view is created with selected fields there will not be much stress on app server
and there by improves the performance. Search View also gives additional search criteria.

What is the difference between record properties and record field properties?
Record properties apply to the entire record definition. Record field properties are not shared
among records, they are specific to a single record definition and are stored with the record.
Each record stores a unique set of record field properties while the primary field definition
remains the same.

What is Component Buffer?


Area in memory, which stores data for the currently active component. Whenever you open a
component the entire data for that component is retrieved upfront and stored in the application
server. Component buffer is a temporary buffer allocation.

What is component processor?


It is a people tool runtime engine that controls the processing of the application.

What is a data buffer?


Data buffer contains multiple components of data.

What is the difference between component buffer and data buffer?


4
Component buffer contains active component data i.e. level 0 data. Data buffer contains
multiple components of data.

What data comes into Component Buffer?


Primary record data, related display fields, translate values and derived work records. If you
keep key and alternate search key on 0 level then only 2 values will appear in Component
Buffer the other field values will not available. In Component Buffer if you want to see the other
field values then place a non-key field on 0 level and make it invisible. Every level will have its
own primary record. A level 0 primary record and a search record can be different but the key
field values should match.

How many levels can we have on a page?


Page allows Nested levels up to 3 levels.

What are Level Based Controls and their Difference?


Level Based controls are Scroll Area, Grid and Scroll Bar.
Scroll areas have their page fields arranged by the developer. Page fields in a gird always
appear in a single row. In grid we can view no of rows by giving occurrences. Scroll areas
provide a row separator when you select multiple occurrences of data. We can view multiple
rows in a grid while in a scroll area you can retrieve only one row at a time. One can have
nested scroll areas but not grids. You can insert grid in a scroll area but not scroll in a grid.

What is the difference between scroll area and Grid?


Scroll areas single row of data will be displayed whereas in grid multiple rows of data will be
available.

Difference between standard, secondary and sub page?


Standard page: It is the graphical interface between users and database. The important data is
displayed in the standard page. We can place secondary as well as a sub page in standard
page.
Secondary Page: Page that will open on users request but remains as a secondary to the
primary page display. We can open it through standard page only. The data within secondary
page is at the same level or below the level of the page control that launches the secondary
page.
Sub page: sub page controls are used to provide standard look for the commonly used fields.
A sub page is referenced as a page control on multiple standard pages.

Difference between sub page and sub record


All the fields in a sub page must be associated with fields of a sub record in the specified record
definition. Sub record contains all related fields, whereas subpage contains fields from sub
record.

What is occur level and occur count?


Occurs Level: Occurs level determines the level of the object that we inserted. By using this we
can set levels for example after inserting a level based control in level 2 if you want to change
the level based control to level 1 you can change the occurs level.
Occur Count: Occur Count determines how many rows should be displayed. For ex if you
want the scroll to display only 5 rows then we will give occurs count to 5.

Difference between Search Record and Add Search Record


5
Search Record: The search record controls access of rows of data in a table, and its keys and
alternate search keys appear on the search page as criteria. The search record might also
contain logic to filter the search to secure rows of data—row-level security is implemented in this
way
Add search record: Add search record is specifically used for add actions. If we are using a
search view as a search record for performance in this situation we will put the main record as a
add search record so that we can enter new values in this main record. The system default is
the standard search record if we don't specify an add search record

What are the options available, while building a table?


The Build process uses Data Definition Language (DDL) to construct a physical database
component that is based on the associated record and field definitions that you created. With
the Build feature, you can create the following.

Create Tables: Creates structure in database.


Create Index: When you build a table, it also creates index for that table
Create View: It will create a sql view.
Alter Tables: When you don’t want to lose the existing data we build that record with this
Create Trigger after the Build process begins, there are no runtime prompts until the process is
complete. All events are written to the Build log.

What are the three build options available when building a table from a record?
Build script file: which generates a sql script that can be run against the desired database to
build the table.
Execute SQL: which builds the table in the database.
Execute and build script: which both build the table and generates a sql script.

Can you write People Code in Secondary as well in Sub Page?


People Code can be used on the secondary page just like any other page. We cannot write
People Code for Sub page.

Can we have 2 Scroll areas at Level 1?


Yes, we can have 2 scroll areas at level 1.

What are multi level pages where should the field at level 0 be getting their data from?
Level 0 fields must be associated with record fields of search record.

Can we keep 2 records at level 0?


Yes we can have 2 records at level 0 provided should match the key fields.

Audit Table and their fields? Record and Field Level Audits
Records the information of user actions details as well as the changes or additions or even
modifications done on the table. Audit records are prefixed with Audit_.

Audit Field Name Purpose


AUDIT_OPRID Identifies the user who caused the system to trigger the audits
—either by performing an add, change, or delete to an audited
field.
AUDIT_STAMP Identifies the date and time the audit was triggered.
AUDIT_ACTN Indicates the type of action that the system audited. Possible
6
actions include:
A: Row inserted.
D: Row deleted.
C: Row changed (updated), but no key fields changed. The
system writes old values to the audit table.
K: Row changed (updated), and at least one key field changed.
The system writes old values to the audit table.
N: Row changed (updated), and at least one key field changed.
The system writes new values to the audit table.
AUDIT_RECNAME Identifies the name of the record definition that was audited.

Record Level Audit: for creating a record for record level audit we need to have 3 fields
Audit_operid, Audit_stamp, and Audit_action. We can create our own audit records by prefixing
Audit_
Field level Audit: By using delivered PS_AUDIT table we can set field level audit.

What are the key disadvantages of auditing?


Auditing adds overhead to transactions that will slow database performance. Audit tables can
grow to be quit large, again draining resources.

What is SQL Object?


People tool object that we can create and use it wherever we want – PC, views, and dynamic
views. %SQL.

Deffered and Interactive Processing


In Interactive mode for every cursor action there will be a trip to the server. In deferred
processing mode, trips to the server are reduced. In Interactive whenever a user exits a field
there will be a trip to the server.
In Differed processing until a user performs an action, which requires a trip to the server there
wont be any trips to the application server.

In how many places we can set Differed processing?


Field
Record
Page
Component

What is the design Considerations while designing a page?


Put the field control on the appropriate derived or work record, rather than on a regular data
record definition to derive its value. Use as few record definitions as possible in a component.
Do not remove table edits to improve performance, even though an edit against another table
causes a short pause. Eliminating them might compromise data integrity. Apply deferred
processing when possible to fields, pages, and components

What is registering a Component?


We will add the component to a Menu and give permissions and security.

What are the considerations that you take while altering a table?
Any time one intends to change an existing object we should always attempt to find out if the
changes are effecting on other system objects. Edit> find definition reference: If a definition
7
reference any other definitions we must research the connection and determine with the
referenced object will have any effects – then we need more follow-up.
Can we use the same Component in 2 Menus?
Yes , we can use same component in any no of menus

Can we have a subpage at 0 Level?


Yes, we can have a sub page at 0 level.

Can we have a Secondary page at 0 Level?


We cannot have a secondary page in 0 Level.

Can we have a Grid in Level 2 and scroll area in level 3?


Yes we can. But performance issues say that a grid should always reside in the last level

Can we have Nested Grids?


No we cannot have Nested Grids.

What is Parent Child Relationship?


To maintain parent child relationship if the parent table contains one key field the child table
should contain the same key field and one additional key.
In parent child relationship we should have a relation between two tables ex: if “A” is the parent
table with “x” as a key and “B” is another table then “B” should have “x” as a key with
another key “y”, then “B” is the child table of for table “A”.

What is the difference between primary record and the search record?
Each scroll area and grid is associated with a single primary record. This represents the
application data table the page fields are associated with. All fields in a scroll area or grid must
be associated with one (and only one) record, which is the primary record for that level.

The search record builds the search page for a component and populates all fields at level 0.
The search record is determined at the component level.

What is PIA Architecture?


In PIA end users do not have any peoplesoft specific software installed on their machines, they
use Internet browser to connect web server, which interacts with application server.

What are components of PIA?


1. Web browser
2. Web server
3. Application server
4. Batch server
5. Database server

What are major tasks that the application server performs in PIA?
The application server maintains a persistent connection to the database, and converts
peopletools and application table data into HTML. The server then provides the HTML to the
web server for delivery to the browser.
The application server also plays a role in connecting development workstations to the database
for three-tier connections.

8
What are the major tasks performed by the web server in PIA?
Web server acts as the front end of the PIA.
The Web server includes Web services software that displays the HTML to the browser. It also
includes java servlets that manage each session’s connection to the application server.

What is Tuxedo/Jolt?
Tuxedo manages the multiple connections to the database. Jolt is a java based communication
protocol. The assembled HTML is sent to the web server.

What is a metadata?
Software that resides on a web server and displays HTML for a Browser.

When you select a row of data from a search page where you are taken to?
The search page takes you to a component the component is made up of one or more pages
with each page containing several fields that hold the data.

What is the difference between adding a row of data and inserting a row of data?
When you use the add action a new high level key is created at level 0, when you insert a row of
data you are adding information that has a one to many relationship with the key at level 0.
Generally you insert rows within scroll areas are grids.

How do you recognize levels on a page other than level 0?


Levels are bound by either a scroll area or a grid.

When exporting a project to a file in what format is the definition data stored?
Projects are stored in XML files.

Can projects be used to transport application data?


No, People soft offers a different tool data mover to transport application data. Projects only
hold people tools data.

What 2 methods are available for transporting definitions in a project between the
databases?
Projects can be exported directly to another database or they can be exported to a file. When
you export to a file you must take the extra step of importing the file from the target database.
By using import and export commands we can transfer.

What is Business Unit? What are the major functions?


A business unit is a way of tracking specific business information for reporting and other roll-up
data collection. It performs 2major functions
1) It allows you to maintain a tree structure to facilitate customer-specific roll-up reporting.
2) It allows you to distribute and administer certain control tables like the department table. This
is extremely important for large or multinational companies.

What is Setid?
Setid's are key to linking business units to record control groups. It is the key on all control
tables in tableset sharing Every row in a control table includes a setid as its key. Setids partition
the data into groups or sets of data that are appropriate for each business unit.

What is Table Sharing?


9
Tableset Sharing is a method of filtering prompt data so that only appropriate values are
available for data entry. With tableset sharing, a single table can offer different values based on
underlying business rules.
Table set Sharing is organized around these basic elements:
Business Units and transaction tables
SetIDs and control tables
Business rules.

What is the difference between a business unit and a setid?


A business unit is a way of tracking and reporting specific business information for reporting and
other roll up data collection. It does not have to be a legal entity for HR. It’s a way of organizing
your organization.

A SetID is a link to Table Set Sharing. Table set sharing simply consists of assigning specific
SetIDs to specific record groups for individual business units to restrict the view of rows of data
within control tables. It’s a way of organizing your data in the system.

SECURITY

How Many Ways we Can Implement Security In People soft?


We can Implement security in People soft in 6 ways:
1. Signon and time-out security.
2. Page and dialog security.
3. Batch environment security.
4. Definition security.
5. Application data security.
6. PeopleSoft Internet Architecture security

What is Permission List?


A Permission List is a list of authorizations that we assign to roles.

What is a Role?
A role is an intermediate object that links the user profiles to the permission lists. Roles enable
you to add permissions to users dynamically.

What is user profile?


A User Profile is a set of data about a particular user. And is useful to define the individual
PeopleSoft users. We define User Profiles and then link them to one or more Roles. Typically,
We link a User Profile to at least one Role in order to be a valid profile. The majority of values
that make up a User Profile are inherited from the linked Roles.

What type of permissions can contains a Permission List?


Permission List stores the Sign-On times, Menus, People Tool access, such as access to
Application Designer.

Can we assign multiple roles to user profile?


Yes.

Can we assign multiple permission lists to roles?


10
Yes.

What is Single sign on?


At a time we connect to more than one database. Means if we are in HR database, after
completion of the transactions if we want to enter into FIN database, for this we need not
reenter the password.

What is a sign on time?


A sign on time is an adjustable interval during which a user is allowed to sign on to PeopleSoft.

How we specify the sign on times and time-out interval?


Using Maintain Security we can specify both the sign on times and time-out interval.

Is it possible to restrict some users to access specific actions?


Yes.

How we execute the batch process?


By using the Process Scheduler. But we should assign the appropriate Process Profile to the
User Profile and create process groups for our processes.

Can we add the Process Profile Permission List directly to the User Profile?
Yes. We can add the Process Profile Permission List directly to the User Profile, not to an
intermediary Role.

What is User ID?


A PeopleSoft User ID is an ID which we enter at the PeopleSoft sign on dialog box. Using the
User Id we can enter into the PeopleSoft system.

How can we assign a User Id and Password to a PeopleSoft user?


Using the PeopleTools Security.

What is Connect ID?


Using the Connect Id we can connect to the Database.

How can we create the Connect IDs?


By running the Connect.SQL and Grant.SQL scripts.

What is User ID?


A PeopleSoft User ID is the ID we enter at the PeopleSoft signon dialog box. Using People
Tools Security, we assign each PeopleSoft user a User ID and password. The combination of
these two items grants users online access to the PeopleSoft system. The system can also use
a User ID stored within an LDAP directory server.
The User ID is the key used to distinctly identify the User Profile definition.

What is Connect ID?


Connect ID is a valid user ID that, when used during login, takes the place of PeopleSoft User
IDs for the logon process. Using Connect ID means we don't have to create a new database
user for every PeopleSoft user that we add to the system.
Connect ID is required for a direct connection (two-tier connection) to the database. So
11
application servers and two-tier Windows Clients require a Connect ID. We specify the Connect
ID for an application server in the Signon section of the PSADMIN utility, and for Windows
Clients we specify the Connect ID in the Startup tab of the Configuration Manager. We can
create a Connect ID by running the Connect and Grant’s scripts.

What is Symbolic ID?


We use Symbolic ID as a search key for retrieving the encrypted value of Access ID, which is
stored in PSACCESSPRFL.
Also, the Symbolic ID acts as an intermediary entity between the User ID and the Access ID. All
the User IDs are associated with a Symbolic ID, which in turn are associated with an Access ID.
For example if we had to change the Access ID, then we need to update only the reference of
the Access ID to Symbolic ID in the PSACCESSPRFL table rather than updating with each and
every User Profile in the PSOPRDEFN table.

What is Access ID?


While creating a User ID, we will assign a Access Profile to the user id, which specifies an
Access ID and password.
PeopleSoft Access ID is the RDBMS ID with which PeopleSoft applications are ultimately
connected to the database after the PeopleSoft system connects using the Connect ID and
validates the User ID and password. An Access ID typically has administrator-level database
access; that is, it has all the RDBMS privileges necessary to access and manipulate data for an
entire PeopleSoft application. The Access ID should have SELECT, UPDATE, and DELETE
access.
It's important to understand that users do not know their corresponding Access ID. They just
signon with their User ID and password and—behind the scenes—the system logs them onto
the database using the Access ID.
Should they try to access the database directly with a query tool using their User or Connect ID,
they have limited access. User and Connect IDs only have access to the few PeopleSoft tables
used during signon, and that access is SELECT-level only. Furthermore, PeopleSoft encrypts all
sensitive data that resides in those tables.

What is the procedure to create a Permission List?

• Go to PeopleTools, Security, Permission & Roles, Permission List.


• On the Search page click Add New Value.
• In the Permission List edit box enter the Permission List name as xy. And click Add.
• Give the description if required and then click Save.
• Go to Web Libraries Tab include all the 27 libraries. Click Save. (Then we can enter into
the browser environment).
• Go to any tab specify the required options then save.

What is the Procedure to create a new Role?

• Go PeopleTools, Security, Permission & Roles, Roles.


• On the Search page click Add New Value.
• In the Role Name edit box enter the Role name as xyz. And click Add.
• Give the description if required and then click Save.
• Go to Permission List Tab and specify the Permission list name as XY, then click
12
Save.
• Go to any tab specify the required options then save.

What is the Procedure to create a new User Profiles?

• Go PeopleTools, Security, User Profiles, User Profiles.


• On the Search page click Add New Value.
• In the User Id edit box enter the User Profile name as xy. And click Add.
• In the General Tab specify the symbolic id as sa1.
• Go to Role Tab and specify the Role Name as xy. Then Save

What is the Procedure to implementing Definition Security?

Go, Definition Security in Application Designer.


File, New Group (Here we can specify all the objects which we want give the
permission to access the user). After creating new groups if we want to modify the group
then go to File, Open, Group Then specify the Group Id.
File, save (save the new group).
File, Open, Permission List. Then specify the Permission List. Then assign groups to
the permission list. Then Save.
Close Application Designer and Definition Security. Reenter with the new user profile and
observe all the things.

What is a Access Group?


Access groups are nodes in a query tree, which are built with PeopleSoft Tree Manger. After we
build a query tree, we give users access to one or more of its access groups. Then they can
generate queries on any tables in the access groups accessible to them.
When we open Query Manager, it displays either an access group structure or an alphabetical
list of records to which we have access. Access groups enable us to logically organize the
record components to control security access within Query. It is not a physical representation of
database. The record components shown are those that the user has been granted access to.

Adding a Access Group:


Open the desired Permission List and select Query, Access Groups Permissions.
Select a Tree Name.
Use the drop-down list boxes to find the Tree Name that we need.
Select the highest Access Group that the user can access.
Use the drop-down list boxes to find the Access Group. The system displays only the access
groups in the selected query tree.
The Access Group selected should be the highest-level tree group to which this Permission List
needs access. The Accessible check box is selected by default. For example, users in the
ALLPANLS permission list have access to all record components in the EIS_ACCESS_GRP
and all access groups below it in the QUERY_TREE_EIS query tree—in other words, to all
record components in the tree.
Clear the Accessible check box, if desired.
Save.

What is a Process Group?


Process groups are collections of Process Definitions that we create using PeopleSoft Process
13
Scheduler. We add process groups to permission lists on the Process Group Permission page.
Typically, we group Process Definitions according to work groups within our organization, and
typically that work group would have a particular role associated with it. Regardless of how we
organize our Process Definitions, we must assign process groups to a permission list.
Users can run only those processes through Process Scheduler that belong to process groups
assigned to their role.

What is a Process Profile?


The process profile definition (defined in Process Scheduler) determines the default Process
Scheduler settings for a user.
For example, with the process profile, we specify such settings as where the system delivers the
output of the process, whether the user can update the process request, and so on.

What is Primary Permission List?


Data permissions, or row-level security, appear either through a Primary Permissions List or a
Row Security Permissions list.

What is Object Security?


Object / Definition Security is a separate People Tool that is used to restrict access of
application developers. We use Definition Security to govern access to the individual database
object definitions, such as Record definitions, Field definitions, and Page definitions. We use
Definition Security to protect particular object definitions from being modified by certain
developers.

What is a Row Level Security?


With row-level security, users can have access to a table without having access to all rows on
that table. This type of security is typically applied to tables that hold sensitive data.
People Soft applications implement row-level security by using a SQL view that joins the data
table with an authorization table.

How to implement row level security by operator id?


You can design special types of SQL views security views to control access to individual rows of
data stored within your application database tables. People soft applications are delivered with
built-in row level security functions, tailored to the specific application.

What is the use of PeopleSoft Internet security?


PeopleSoft Internet security controls the user access to shared hardware and software
resources, So that only authorized users can connect to the web and application servers. This is
also called Runtime Security.

What is the use of Web server/Application server security?


Web server/Application server security controls access to system objects and resources, So
that only authorized users can connect to a given database.

What is the use of Database security?


Database security controls the access to database tables.

What is the use of PeopleSoft application security?

14
At what level we can setup the PeopleSoft application security?
User Level
Row-Level
Field-Level
Object level.

Tell about User Level security?


By using the Maintain security PeopleTool we can establish the user security. Using the User
Security we can controls the user access into PeopelSoft applications.

How can we implement the Row-Level Security? What is the use of Row-Level Security?
For this we don’t have any PeopleTool. Row-Level Security is implemented by using the SQL
Views.
Using the Row-Level Security we can controls the rows of data that can be accessed by each
user.

How we implement the Field-Level security? What is the use of Field-Level security?
By assigning the PeopleCode to the field. Like Hide Unhide, Gray, Ungray.
Using the Field-Level security we can control the user access to specific data filed.

How can we establish the Object security?


By using the Definition Security PeopleTool.

What is the purpose of the Definition Security?


Using the Definition Security we can restrict particular objects from application developers. But
not for the end users.

How many objects we can develop using the Definition Security?


Only one objects that is Group ID.

Can we run the Definition Security in Browser environment?


No. it is applicable only in windows environment.

What is the difference between Maintain security and Object Security (Definition)?
By using the Maintain Security we can restricts the users to access the particular functions like
some pages, some records, but using the Object security we restrict the total objects.
Ex: if we don't want a developer to touch Application Engine programs, don't allow them to
access Application Engine.

What is Batch Environment Security? or How do you give security to batch programs like
SQR and A.E?
There are three levels of security for batch programs:
• Each batch program has a run control that we define before we can run the batch
program. The run controls are set up using PeopleSoft Process Scheduler

• Also using PeopleSoft Process Scheduler, you set up Process Groups, which are groups
of batch processes. Then in PeopleTools Security you add Process Groups to a security
15
profile. Users can run processes that belong to the Process Groups assigned to their
security profile.

• In your RDBMS environment, you can restrict off-line access to batch processes using
the security tools described in your platform manuals.
Note: You add the Process Profile Permission List directly to the User Profile, not to an
intermediary Role.

The PeopleSoft Internet Architecture is in the category of PeopleSoft online security, also known
as runtime security. Only authorized users can connect to the web and application server, and
only authorized application servers can connect to a given database.

COMPONENT INTERFACE

What is Component Interface?


Component Interface is a peoplesoft object used to access PeopleSoft Component from
external clients (Third Party Applications) including all business rules and data without going
through the peoplesoft client.
We use component interface to expose peoplesoft component (methods and properties) to the
external software (ex,VB, c, c++, java, com, dcom etc)

What are the major elements in the Component Interface Architecture?


There are three fundamental elements in the component interface architecture
1. components
2. component interfaces
3. Component interface API.

What are the attributes of the Component Interface?


1. Component interface name.
2. Keys (get keys, create keys, and find keys).
3. Properties and collections (fields and records).
4. Methods.

How many types of keys are there?


Keys are 3 types
1. Get keys
2. Create keys
3. Find keys
Get keys are nothing but search key of the component search record, We cannot change the
get keys.
Create keys are based on the add search record keys (add mode) and generated automatically
for the component interface. We cannot change the create keys
Find keys are based on search key and alternate search keys of the search record. We can
remove find keys if we don’t want to use.

What is component interface properties?


Properties: Properties are individual fields in component for component interface

16
Properties are 2 types
1. Standard properties
2. User defined properties
Standard properties exists for every component interfaces.

What is Collections?
Collections are referred as scrolls(level based controls will be having a primary record) in
component for component interface.
CreateKeyInfoCollection: Returns a set of items that describes the create keys.

GetKeyInfoCollection: Returns a set of items that describes the get keys

FindKeyInfoCollection: Returns a set of items that describes the find keys

PropertyInfoCollection: Returns a set of items that describes properties.

What is Component Interface Methods? How many Methods are there?


Methods are objects that perform a very specific function on a component interface at run-time.
The event of a component interface is methods (like on execute for app-engine.)
2 types of methods are there
1. Standard methods
1. User defined methods

What are standard methods?


Standard methods are those that are available for all component interfaces.
Cancel, Create, Find, Get, Save.
We can disable the standard methods, if we don’t want that functionality by going to the CI
properties dialog box. These standard methods provide basic functionality for any CI.

User defined methods:


User-defined methods are created in PeopleSoft Application Designer to provide added
functionality to the component interface. These methods are functions that are made accessible
through the component interface. Each function maps to a user-defined method.

How can we create a new Component Interface?


1. Select File, New from the PeopleSoft Application Designer menu.
2. Select the Component Interface definition type from the new dialog box.
3. Select the component, which is base for the component interface.
4. Click Save to save the Component Interface.
5. Save the component interface

Can we map more than one component at a time from the Component Interface?
No. A component interface maps to one, and only one, PeopleSoft component.

How can we access the component data?


By internal (PeopleCode) and external (Java, C/C++, or COM) applications.

Can we create the get keys and find keys manually?


No. When we create a new component interface, get and find keys are created based on the

17
search record definition for the underlying component.

How many types of properties can include the Component Interface?


Standard properties
User-Defined Properties

What are the standard properties?


InteractiveMode
GetHistoryItems
EditHistoryItems

Can we create the user-defined methods?


Yes. We can create user-defined methods after creating a Component Interface.

Steps to Create Component Interface:


Create 3 fields
Nut_Id (Character, 5)
Name (Character, 15)
Salary (Number, 7.2)
Create new record and insert these 3 fields. Save the record with the name nut_source.
Save as the nut_source record to nut_target.
Create new page and insert all the fields of nut_source record. Save the page with the name
nut_source.
Create new page and insert all the fields of nut_target record. Save the page with the name
nut_target.
Create new component and insert nut_source page and go to the properties and specify the
search record as nut_source in the use tab.
Create new component and insert nut_target page and go to the properties and specify the
search record as nut_target in the use tab.
Register the two components.
File > New > Component Interface object. Then it asks the component, so give our target
component name that is nut_target. (Means we are creating the Component Interface based on
the target component).
Save the Component Interface with the name nut_compointerface.
Build, PeopleSoft API. Then press ok.
Go the source record that is nut_source. Drag and drop the Component Interface into nut_id
(any field we can choose). Save Post Change event.
Remove the comments of (Execute Cancel, Execute Save, Execute Create) add the
comments to Execute Get.
Add the comments to Execute Get.
Delete rem and <*> from rem &oCnuCOmpointercace.nut_ID = <*>; and drag the nut_ID field
from nut_ SOURCE record.
Delete rem and <*> from rem &oCnuCOmpointercace.nut_NAME = <*>; and drag the
nut_NAME field from nut_ SOURCE record.
Delete rem and <*> from rem &oCnuCOmpointercace.nut_SALARY = <*>; and drag the
nut_SALARY field from NUT_SOURCE record.

Some Points in Component Interface:


Every component interface must be based on a component
If we want to expose a business process (logic) then we have to expose out component.
18
Through component Interface we can access internal (including peoplesoft) as well as external
applications.
Multiple component interfaces can reference the same component. I.e. we can expose only one
component to a component interface. We cannot expose 2 components to a single component
interface.
Component interface API’s are used by the other applications to have real time access
(synchronous) to peoplesoft component interfaces.
While creating a new component interface, we have to identify the name of the source
component
After that we will be prompted for default properties (records and fileds)
If we want we can expose all the records and fields (properties) in the component to the calling
program at run time or else we can drag and drop only those records and fields which we want
third party to use.
Note: Only the objects in the component interface view will be exposed to the calling
program at run-time.

Example for your understanding:


When ever we add a new employee row in personal data table(while recruiting, once we hire)
We want a student table should be populated with a new row by creating a new student id along
with employee information.
Here two tables are involved (means two components)
One is personal data component.
Second is student information component.
So now we will create a new component interface in application designer by giving name as
student profile based on student information component
Then we will write save post change peoplecode in personal data component to instantiate,
populate and save the component interface object.
In the save post change event we will instantiate session object which is API object
To get the component interface.
(Refer account lock project description)
we will use session object whenever we will use integration tools.
We will enter new row in personal data table and see in the student information component
whether new student id is created or not(testing)
Before testing we will give security to the new component interface.

Why should we write in save post change only, why not in other event?
Because component interface object data will not be in component buffer and student
information component data will not be in component buffer so we are updating/inserting the
data in the data base not in the component buffer tables.
Whenever we create a component interface ,we will give a name to CI to access.

CONFIGURATION MANAGER

What is Configuration Manager


The Configuration Manager is a PeopleTool designed to simplify workstation administration by
providing a way to adjust the PeopleSoft registry settings from one central location. With the
Configuration Manager you can set up one workstation to reflect the environment at your site,
and then you can export the configuration file, which can be shared among all the workstations
19
at your site.

The Configuration Manager contains a variety of setting controls that allow you to set up your
workstations for connecting to the database, using workflow, and so on. It enables you to define
separate "profiles" for connecting to different PeopleSoft databases.

What is Query Manager?


Visual representations of your PeopleSoft database, without writing Structured Query Language
(SQL) statements. Using the Query Manager we can develop only one object that is Query.
Uses of the Query Manager

• Display data in a grid for review purpose.


• We can send the output to the Windows Excel or Crystal reports.
• For creating the Dimensions in the Cube Manager.
• We can create the data structure for Peoplesoft nVision.
• We can create the basic structure of online analytical processing (OLAP) dimensions.
• Run Query from any PeopleSoft application page.
• To determine to whom to forward information. This type of query is called role query.
• Searching the records based on sophisticated search criteria. This type of query is called
a search query, For Creating Views.

20

S-ar putea să vă placă și