PeopleSoft Access Checklist
These instructions outline how to set up access for external consultants and vendors to Cornell University's PeopleSoft service. Many steps pertain to setting up a secure work environment. With the approval of Cornell's IT Security Office, vendors and consultants may substitute comparable local security practices. To obtain approval to non-standard but comparable security practices, the Cornell representative working with the vendor or consultant must contact email@example.com.
We suggest that you print the checklist and use it in conjunction with the detailed steps to track progress in arranging a consultant's access to PeopleSoft.