Skip to main content

PeopleSoft Access Checklist

Setting up PeopleSoft access for vendors and consultants

These instructions outline how to set up access for external consultants and vendors to Cornell University's PeopleSoft service. Many steps pertain to setting up a secure work environment. With the approval of Cornell's IT Security Office, vendors and consultants may substitute comparable local security practices. To obtain approval to non-standard but comparable security practices, the Cornell representative working with the vendor or consultant must contact

We suggest that you print the checklist and use it in conjunction with the detailed steps to track progress in arranging a consultant's access to PeopleSoft.

Was this page helpful?

Your feedback helps improve the site.