Oracle HCM Cloud: Security

0 étudiant

Duration: 2 Days

What you will learn

This Oracle HCM Cloud: Security training teaches you about the Oracle HCM Cloud role-based security model. Expert
Oracle University instructors help you gain hands-on experience with the UIs used to manage security in Oracle HCM
Cloud.

Learn To:

Identify and manage the different types of roles, including aggregate privileges and data, abstract, job, and duty roles.
Create security profiles to restrict data access.
Create data roles and assign security profiles to them.
Create role-provisioning rules.
Provision roles to users.
Create implementation users.
Create a custom job role on the Security Console.
Create a custom duty role on the Security Console.
Use the many features of the Security Console.

Benefits to You

By taking this course, you’ll learn how to plan and implement security in Oracle HCM Cloud. You’ll learn some advanced
tips for implementing security, using features such as Areas of Responsibility to minimize the number of data roles you
need to create. You’ll use the Security Console interface for managing security.
Please Note
This course is relevant for any customers using Oracle Fusion Applications Release 11.1.12. It’s beneficial for both
Oracle Cloud and on-premises deployments.

Audience

Functional Implementer
Implementation Consultant
Security Administrators

Related Training

Suggested Prerequisites
Introduction to Oracle HCM Cloud
Introduction to Oracle Human Capital Mgmt Cloud
Oracle HCM Cloud: Global Human Resources

Course Objectives

Describe how security policies are generated for roles that inherit a duty role or aggregate privilege
Create a custom job role
Understand how to use the Security Console
Describe how HCM security works with Oracle’s BI Reporting tools
Understand role delegation
Create a custom duty role
Differentiate the five types of roles used in Oracle Fusion Applications security
Identify key components of the Security Reference Implementation
Create a new data role and assign security profiles
Describe how user accounts are created and roles are provisioned to users
Manage provisioning rules that map roles to users based on their HR assignments
Describe the key features of Oracle Fusion Applications security

Course Topics

Security Overview

Role-Based Security Model
Predefined HCM Roles
Role Inheritance
Role Types
Security Privileges
Role Evaluation
Customizing Security for Your Needs

Security Profiles and Data Roles

Data Security Through Security Profiles
HCM Security Profile Types
Predefined HCM Security Profiles
HCM Security Profiles Best Practices
Key Points for Creating Security Profiles
Creating Security Profiles and Assigning to a New Data Role
Assigning Security Profiles to Existing Roles
Editing Security Profiles

User Management

User Account Creation Scenarios
Maintaining User Accounts
Enterprise-Level User-Management Options
Managing Applications Security Preferences
Implementation Users
Reporting on Users

Role Provisioning

Provisioning Roles to Users: Overview
Defining Role-Provisioning Rules
Role Mappings in Detail
Autoprovisioning
Role-Provisioning Rules for Abstract Roles
Integration with the New Hire Flow
Role-Provisioning Strategies
Role Delegation

HCM Security Management Data Stores, Tools, Tasks, and Processes

HCM Security Management Data Stores
HCM Security Tasks
Synchronization Processes and Preferences
HCM Security Processes
The Security Console

Using the Security Console

Security Console: Overview and Benefits
Running the Import User and Role Application Security Data Process
Launching the Security Console
Using Key Features of the Security Console
Role Visualization
Role Comparison
Security Console Administration Options

Creating Custom Roles on the Security Console

Creating Custom Job and Abstract Roles
Copying Application Roles
Transaction Analysis Duty Roles
Editing Copied Roles
Creating Roles from Scratch
Regenerating Data Roles

HCM Security Deep Dive

Aggregate Privileges and Duty Roles In Detail
Function Security Privileges
Data Security Policy Components
Data Security – Application Role Creation
Data Security – FND_GRANTS Generation
Data Security – Data Role Creation
Data Security in Action
Creating a Custom Duty Role

Tips for Implementing HCM Security

Resilience to Change
Impersonation
Minimizing the Number of Data Roles Using Areas of Responsibility
Defining Areas of Responsibility
Securing Persons Using Custom Criteria
Role Optimization

Security and HCM Reporting

OTBI Security
BI Publisher Security

Les détails ne sont pas renseignés

Formateur

Avatar de l’utilisateur bscf

0.00 average based on 0 ratings

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%
Gratuit

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont indiqués avec *