Book Image

Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation

By : Ranjeet Yadav
Book Image

Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation

By: Ranjeet Yadav

Overview of this book

PeopleSoft financial management applications have been recognized as a leading ERP product across a wide range of industries that helps organizations automate their accounting operations, cut costs, and streamline business processes. They offer industry leading solutions for organizations' global needs, however complex they may be. PeopleSoft Enterprise Financial Management 9.1 Implementation is probably the only learning resource for a novice practitioner, who may otherwise have to rely on thousands of pages of documentation for such a complex ERP system. This book covers all the crucial elements of PeopleSoft Financials—a business processes, configuration, and implementation guide. This is the ideal one-stop resource before entering the world of PeopleSoft implementation. Beginning with the fundamentals of a generic financial ERP system, this book moves on to basic PeopleSoft concepts and then dives into discussing the individual modules in detail. You will see how to leverage financial modules such as Billing, Accounts Receivable, Accounts Payable, Asset Management, Expenses, and General Ledger. Dedicated chapters discuss key PeopleSoft features such as application security and commitment control for budgeting. You will learn fundamental ERP concepts such as the chart of accounts, used by organizations for recording and reporting financial transactions, and how to implement them in PeopleSoft through chartfields, business units, and SetIDs.
Table of Contents (16 chapters)
Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


PeopleSoft security performs a critical task of controlling the access of system features to appropriate users. User security is a three-level hierarchical structure consisting of User Profiles, Roles, and Permission Lists. Permission Lists control which pages can be accessed and the mode of the access. A Role is assigned as many permission lists as needed. It can be considered a collection of system features. A user profile is created for each system user and is assigned as many roles as needed by the user.

While the user security controls which system pages can be accessed by a user, the Row-Level Security controls which rows of data can be accessed by a user. It limits the data retrieved by a user to specific values of a Business unit, SetID, Ledger, Book, Project, Pay cycle, or a Planning Instance. Row-level security options can be implemented by User ID (suited to a small user base) or Permission List (ideally suited for large user base with similar access requirements). In other...