Sentinel Help Center
  • Sentinel Overview
    • Dashboard
    • Environments
    • User Hub
    • Requests
    • Reports
  • Installation & Updates
    • Sentinel Shortcuts [From PS]
    • Sentinel VM Requirements
    • Host Server Setup RHEL/CentOS 8
    • Host Server Setup RHEL/CentOS 9
    • Sentinel Server Update
    • Oracle Database Account
    • PostgreSQL Backups
  • Settings
    • Sentinel Accounts
    • Databases
    • System Settings
    • Single Sign-On
    • Access Request Settings
    • Role Groups
    • Role Approvers
    • Custom Forms
    • Sensitive Data Settings
    • Security Log
  • Security Administration
    • Menu Functions
    • Direct Access
    • Users
      • User Access Updates
      • User Profile Features
    • Roles
      • Role Updates
      • Role Features
    • Permission Lists
      • Permission List Updates
      • Permission List Features
    • Dynamic Security
    • Temporary Access
    • Fluid Security
    • Security Matrix
    • Compare Reports
  • Security Reports
    • Security Reports Setup
    • Page Analysis
    • User Access
    • Role Access
    • Permission List Access
    • Query Analysis
    • Compare Users
    • PeopleTools Access
    • Portal Menus
  • Audit Review
    • Audit Review Setup
    • Privileged Access
    • Sensitive Data
    • Segregation of Duties
    • Correction Access
    • Restricted Roles
    • Role Changes
    • Notifications
    • Manager Reports
  • Access Requests
    • Implementation Guide
    • Submit New Request
    • Review & Approve Requests
    • Workflows & Routing
    • Apply Changes
  • Resources
    • User Training Guide
    • Policies
      • Policy Overview
      • Data Privacy
      • Cloud Security
      • Software Development
      • Disaster Recovery
      • Service Level Agreement
      • Employees
Powered by GitBook
On this page
  1. Security Administration

Compare Reports

Environments - [Select Environment]

PreviousSecurity MatrixNextSecurity Reports

Last updated 1 year ago

Compare Reports provide on-demand analysis to identify security differences and new application objects. In Sentinel, you can run a compare report between Environments, Users, Roles, or Permission Lists.

Compare Environments to analyze differences between PeopleTools objects and definitions.

How to Compare Environments:

  1. Navigate to Environments.

  2. Under Actions, click the 'Compare' icon for your Source Environment.

  3. Click 'Compare' for your Target Environment.

The Compare Summary is an interactive report with drill-down capabilities to identify differences between objects and definitions.

Compare security access between Users and PeopleSoft Environments.

How to Compare User Profiles:

  1. Navigate to Environments and select an Environment.

  2. Select 'Users' and choose a user account.

  3. Click the 'Compare' button located at the top right.

  4. Select compare of a Target Environment to view security differences.

Filter the User Profile Compare Summary using the General or User Role menus.

Compare Role Setup between PeopleSoft Environments.

How to Compare Roles:

  1. Navigate to Environments and select an Environment.

  2. Select 'Roles' and choose a Role.

  3. Click the 'Compare' button located at the top right.

  4. Select compare of a Target Environment and choose a Role to view security differences.

  5. If applicable, choose to migrate the Role into the Target Environment.

The Role Compare Summary is an interactive report with drill-down capabilities to view affected Roles and Permission Lists.

Compare security permissions between PeopleSoft Environments.

How to Compare Permission Lists:

  1. Navigate to Environments and select an Environment.

  2. Select 'Permission Lists' and choose a Permission List.

  3. Click the 'Compare' button located at the top right.

  4. Select compare of a Target Environment and choose a Permission List to view security differences.

  5. If applicable, choose to migrate the Permission List into the Target Environment.

The Permission List Migration Analysis is an interactive report with drill-down capabilities to view affected Roles and Permission Lists, as well as differences between objects and definitions.