Using a Permission List associated with a user and identifying security sets and access types in the Security by Permiss
Posted: Sun Jun 11, 2023 3:56 pm
Using a Permission List associated with a user and identifying security sets and access types in the Security by Permission List component of PeopleSoft are known as _____.
A. Role-based data permission security
B. Tree-based data permission security
C. Group-based data permission security
D. Country-based data permission security E. PeopleCode-based data permission security
A. Role-based data permission security
B. Tree-based data permission security
C. Group-based data permission security
D. Country-based data permission security E. PeopleCode-based data permission security