Title Summary File
Capture Change Ticket Numbers In Oracle Database Audit Streams

Reconciling database events to ticket numbers is a time consuming manual task that can be easily automated. The solution is to populate the...

Whitepapers and Presentations File
Guide to PeopleSoft Logging and Auditing

Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy...

Whitepapers and Presentations File
PeopleSoft Data Mover Security

The Data Mover allows for total manipulation of data within PeopleSoft. You can use it to transfer data among PeopleSoft databases, regardless of...

Oracle Security Blog
PeopleSoft Process Scheduler Security

When performing a PeopleSoft security audit Integrigy carefully reviews batch processing activity generated through the Process Scheduler. Of...

Oracle Security Blog
PeopleSoft User Security

When performing a PeopleSoft security audit, reconciling users should be one of the first tasks. This includes default accounts created through...

Oracle Security Blog
PeopleSoft Jolt Security

Jolt along with Tuxedo supports PeopleSoft web requests. Specifically, Jolt is the layer between the application server and the web server. It is...

Oracle Security Blog
PeopleSoft PUBLIC User Security

PeopleSoft Public users are not required to authenticate (sign on). These are generic accounts created for specific purposes, for example...

Oracle Security Blog
PeopleSoft Guest User Security

Being hospitable and welcoming to guests is usually considered good manners.  That said, being a gracious host does not mean you should be...

Oracle Security Blog
PeopleSoft Security User Authorization Audits

When performing a PeopleSoft security audit, reviewing what rights and privileges individual users have been granted for system and application...

Oracle Security Blog
PeopleSoft Logging and Auditing

Logging and auditing are one of the pillars of PeopleSoft Security.  Both application and database auditing is required. Logging and auditing...

Oracle Security Blog

Pages