Understanding How to Enforce Row-Level Security


Concept


Steps:

  1. PeopleSoft applications implement row-level security by using a query security record (typically a view) that is specified on the record definition that joins the data table with an authorization table.

    Step 1
  2. When a user searches for data in the data table, the system performs a related record join between the security record view and the base table (rather than searching the table directly).

     

    The view adds a security check to the search, based on the criteria that you have set up for row-level security.

    Step 2
  3. In this example, to restrict users to seeing only data from their own departments, the view would select from the underlying table only those rows where the DEPTID matches the user’s DEPTID.

    Step 3
  4. You can specify the query security record by selecting an appropriate view from the Query Security Record  list on the Record Properties dialog box for any record definition.

    Step 4

You have successfully reviewed the Understanding How to Enforce Row-Level Security  topic.

Table of Contents  Start Topic