Oracle HCM Cloud: Security

DesTech
Remote
Schedule

Partner
Remote
Schedule

Course DateStart TimeEnd TimeTime ZoneLocationDaysPrice
Call for In Class or Live Virtual Dates2$2,700 USDPurchase


Oracle HCM Cloud: Security

Description: This Oracle HCM Cloud: Security training teaches you about the Oracle HCM Cloud role-based security model. Expert Oracle University instructors help you gain hands-on experience with the UIs used to manage security in Oracle HCM Cloud.

Learn To:

  • Identify and manage the different types of roles, including aggregate privileges and data, abstract, job, and duty roles
  • Create security profiles to restrict data access
  • Create data roles and assign security profiles to them
  • Create role-provisioning rules
  • Provision roles to users
  • Create implementation users
  • Create a job role on the Security Console
  • Create a duty role on the Security Console
  • Use the many features of the Security Console

Duration: 2 Days

Course Objectives:

  • Describe how user accounts are created and roles are provisioned to users
  • Manage provisioning rules that map roles to users based on their HR assignments
  • Describe the key features of Oracle Fusion Applications security
  • Describe how security policies are generated for roles that inherit a duty role or aggregate privilege
  • Create a job role
  • Understand how to use the Security Console
  • Describe how HCM security works with Oracle's BI Reporting tools
  • Understand role delegation
  • Create a duty role
  • Differentiate the five types of roles used in Oracle Fusion Applications security
  • Identify key components of the Security Reference Implementation
  • Create a new data role and assign security profiles

Audience:

  • Functional Implementer
  • Implementation Consultant
  • Security Administrators

Prerequisites:

Topics:

Security Overview

  • Role-Based Security Model
  • Predefined HCM Roles
  • Role Inheritance
  • Role Types
  • Security Privileges
  • Role Evaluation
  • Customizing Security for Your Needs

Security Profiles and Data Roles

  • Data Security Through Security Profiles
  • HCM Security Profile Types
  • Predefined HCM Security Profiles
  • HCM Security Profiles Best Practices
  • Key Points for Creating Security Profiles
  • Creating Security Profiles and Assigning to a New Data Role
  • Assigning Security Profiles to Existing Roles
  • Editing Security Profiles

User Management

  • User Account Creation Scenarios
  • Maintaining User Accounts
  • Enterprise-Level User-Management Options
  • Managing Applications Security Preferences
  • Implementation Users
  • Reporting on Users

Role Provisioning

  • Provisioning Roles to Users: Overview
  • Defining Role-Provisioning Rules
  • Role Mappings in Detail
  • Autoprovisioning
  • Role-Provisioning Rules for Abstract Roles
  • Integration with the New Hire Flow
  • Role-Provisioning Strategies
  • Role Delegation

HCM Security Management Data Stores, Tools, Tasks, and Processes

  • HCM Security Management Data Stores
  • HCM Security Tasks
  • Synchronization Processes and Preferences
  • HCM Security Processes
  • The Security Console

Using the Security Console

  • Security Console: Overview and Benefits
  • Running the Import User and Role Application Security Data Process
  • Launching the Security Console
  • Using Key Features of the Security Console
  • Role Visualization
  • Role Comparison
  • Security Console Administration Options

Creating Custom Roles on the Security Console

  • Creating Custom Job and Abstract Roles
  • Copying Application Roles
  • Transaction Analysis Duty Roles
  • Editing Copied Roles
  • Creating Roles from Scratch
  • Regenerating Data Roles

HCM Security Deep Dive

  • Aggregate Privileges and Duty Roles In Detail
  • Function Security Privileges
  • Data Security Policy Components
  • Data Security - Application Role Creation
  • Data Security - FND_GRANTS Generation
  • Data Security - Data Role Creation
  • Data Security in Action
  • Creating a Custom Duty Role

Tips for Implementing HCM Security

  • Resilience to Change
  • Impersonation
  • Minimizing the Number of Data Roles Using Areas of Responsibility
  • Defining Areas of Responsibility
  • Securing Persons Using Custom Criteria
  • Role Optimization

Security and HCM Reporting

  • OTBI Security
  • BI Publisher Security
Right Menu IconMENU