Database
- As financial data is processed, the contents of the data are extracted and stored in the database.
- Configuration information to enable processing the financial data is stored in the database.
- The audit log and system log database tables might contain PII, depending on the log entry.
Your users can access this information by using the Control Center and its user interface pages. Use the authorization methods that are provided by the Control Center to ensure that only users with a valid business need can access the data. For more information about setting up authorization in Control Center, see Common Services security - Control Center.
Database connection information security
For many Common Services utilities, such as the Data Setup Utility, the database connection information can be configured in a file that can optionally be encrypted. If you do not want to encrypt this file, the database connection information can be passed as command-line parameters to the utility instead of using a plain text properties file. For more information about the utilities that support encrypting their configuration files, see Encrypting configuration files in Common Services.