Oracle Database Account
Sentinel server requires various PeopleSoft tables for Security, Reporting and Analytics .
Each PeopleSoft environment should provide Oracle Database account for Sentinel. The easiest way is provide SYSADM account for any development environments.
Production environment should have dedicated sentinel account with fine grained access.
Production Account
For example, account for Sentinel will have name - snt_user
Create it user with:
CREATE USER snt_user identified by "YourStrongPassword";Grant ability to connect to database:
GRANT CREATE SESSION to snt_user;
GRANT ALTER SESSION to snt_user;Read Access
Login as PSADMIN user and grant read access to all tables and views:
GRANT SELECT_CATALOG_ROLE to snt_user;
GRANT SELECT ON SYSADM.PSTREENODE TO snt_user;
GRANT SELECT ON SYSADM.PS_ROLEXLATOPR TO snt_user;
GRANT SELECT ON SYSADM.PSVERSION TO snt_user;
GRANT SELECT ON SYSADM.PSOPERATION TO snt_user;
GRANT SELECT ON SYSADM.PSPRSMHPASGPGLT TO snt_user;
GRANT SELECT ON SYSADM.PSRECDEFN TO snt_user;
GRANT SELECT ON SYSADM.PSPGEACCESSDESC TO snt_user;
GRANT SELECT ON SYSADM.PS_EOCC_HDR_EXCROL TO snt_user;
GRANT SELECT ON SYSADM.PSPNLGROUP TO snt_user;
GRANT SELECT ON SYSADM.PSAUTHSIGNON TO snt_user;
GRANT SELECT ON SYSADM.PSAUTHBUSCOMP TO snt_user;
GRANT SELECT ON SYSADM.PSMENUITEM TO snt_user;
GRANT SELECT ON SYSADM.PSUSEREMAIL TO snt_user;
GRANT SELECT ON SYSADM.PSACCESSPROFILE TO snt_user;
GRANT SELECT ON SYSADM.PS_SCRTY_QUERY TO snt_user;
GRANT SELECT ON SYSADM.PSROLECLASS TO snt_user;
GRANT SELECT ON SYSADM.PSPNLFIELD TO snt_user;
GRANT SELECT ON SYSADM.PSPRSMDEFN TO snt_user;
GRANT SELECT ON SYSADM.PS_PRCSDEFNPNL TO snt_user;
GRANT SELECT ON SYSADM.PS_PRCSJOBGRP TO snt_user;
GRANT SELECT ON SYSADM.PSDBFIELD TO snt_user;
GRANT SELECT ON SYSADM.PSQRYACCLSTRECS TO snt_user;
GRANT SELECT ON SYSADM.PSRECFIELDDB TO snt_user;
GRANT SELECT ON SYSADM.PSRECFIELD TO snt_user;
GRANT SELECT ON SYSADM.PSOPRALIAS TO snt_user;
GRANT SELECT ON SYSADM.PSPNLGRPDEFN TO snt_user;
GRANT SELECT ON SYSADM.PSOPRDEFN TO snt_user;
GRANT SELECT ON SYSADM.PS_EOCC_CONFIG_HDR TO snt_user;
GRANT SELECT ON SYSADM.PSBCDEFN TO snt_user;
GRANT SELECT ON SYSADM.PS_EOCC_EX_USR_LST TO snt_user;
GRANT SELECT ON SYSADM.PSPRSMSYSATTRVL TO snt_user;
GRANT SELECT ON SYSADM.PS_INSTALLATION_HR TO snt_user;
GRANT SELECT ON SYSADM.PSSTATUS TO snt_user;
GRANT SELECT ON SYSADM.PSAUTHWS TO snt_user;
GRANT SELECT ON SYSADM.PS_PRCSDEFNGRP TO snt_user;
GRANT SELECT ON SYSADM.PSROLEDEFN TO snt_user;
GRANT SELECT ON SYSADM.PSQRYDEFN TO snt_user;
GRANT SELECT ON SYSADM.PSROLEUSER TO snt_user;
GRANT SELECT ON SYSADM.PS_EOCC_USER_LST TO snt_user;
GRANT SELECT ON SYSADM.PSPRSMPERM TO snt_user;
GRANT SELECT ON SYSADM.PSAUTHITEM TO snt_user;
GRANT SELECT ON SYSADM.PSCLASSDEFN TO snt_user;
GRANT SELECT ON SYSADM.PSRELEASE TO snt_user;
GRANT SELECT ON SYSADM.PSPTSCRTY_ADS_P TO snt_user;
GRANT SELECT ON SYSADM.PS_MAINTENANCE_LOG TO snt_user;
GRANT SELECT ON SYSADM.PSPCMPROG TO snt_user;
GRANT SELECT ON SYSADM.PSPTPN_MSG_TBL TO snt_user;
GRANT SELECT ON SYSADM.PSMENUDEFN TO snt_user;
GRANT SELECT ON SYSADM.PS_SCRTY_ACC_GRP TO snt_user;
GRANT SELECT ON SYSADM.PS_JOB TO snt_user;
GRANT SELECT ON SYSADM.PSAUTHPRCS TO snt_user;
GRANT SELECT ON SYSADM.PSQRYFIELD TO snt_user;
GRANT SELECT ON SYSADM.PSPRCSPRFL TO snt_user;
GRANT SELECT ON SYSADM.PSUSERATTR TO snt_user;
GRANT SELECT ON SYSADM.PS_ARCH_SECURITY TO snt_user;
GRANT SELECT ON SYSADM.PSROLECANGRANT TO snt_user;Tables specific to HRMS systems
Write Access
Sentinel can simplify access changes for Users, Roles and Permission Lists. To be able to provide such functionality write access is required to following tables:
Please note, these tables are subject to change based on current/feature Sentinel functionality. Check environment build log for any access errors.
Tables specific to HRMS systems
SACR security related tables for Campus Solutions only
Job data
Sentinel uses job source query which gathers main job information for each employee. Settings located in Admin / Settings / Job Source in your sentinel installation. By default this query fetching data from HRMS environment. Based on organization needs, query can be customised to use different tables and any type of environment.
Access to these tables should be granted for default query in HRMS environment.
Verify Access
To verify that the snt_user has been granted permission for the tables by querying the "DBA_TAB_PRIVS" data dictionary view. Use the following SQL query to display the permissions granted to snt_user for the tables:
Last updated