Duration: 2 Days
What you will learn
This Oracle HCM Cloud: Security training teaches you about the Oracle HCM Cloud role-based security model. Expert
Oracle University instructors help you gain hands-on experience with the UIs used to manage security in Oracle HCM
Cloud.
Learn To:
Identify and manage the different types of roles, including aggregate privileges and data, abstract, job, and duty roles.
Create security profiles to restrict data access.
Create data roles and assign security profiles to them.
Create role-provisioning rules.
Provision roles to users.
Create implementation users.
Create a custom job role on the Security Console.
Create a custom duty role on the Security Console.
Use the many features of the Security Console.
Benefits to You
By taking this course, you’ll learn how to plan and implement security in Oracle HCM Cloud. You’ll learn some advanced
tips for implementing security, using features such as Areas of Responsibility to minimize the number of data roles you
need to create. You’ll use the Security Console interface for managing security.
Please Note
This course is relevant for any customers using Oracle Fusion Applications Release 11.1.12. It’s beneficial for both
Oracle Cloud and on-premises deployments.
Audience
Functional Implementer
Implementation Consultant
Security Administrators
Related Training
Suggested Prerequisites
Introduction to Oracle HCM Cloud
Introduction to Oracle Human Capital Mgmt Cloud
Oracle HCM Cloud: Global Human Resources
Course Objectives
Describe how security policies are generated for roles that inherit a duty role or aggregate privilege
Create a custom job role
Understand how to use the Security Console
Describe how HCM security works with Oracle’s BI Reporting tools
Understand role delegation
Create a custom duty role
Differentiate the five types of roles used in Oracle Fusion Applications security
Identify key components of the Security Reference Implementation
Create a new data role and assign security profiles
Describe how user accounts are created and roles are provisioned to users
Manage provisioning rules that map roles to users based on their HR assignments
Describe the key features of Oracle Fusion Applications security
Course Topics
Security Overview
Role-Based Security Model
Predefined HCM Roles
Role Inheritance
Role Types
Security Privileges
Role Evaluation
Customizing Security for Your Needs
Security Profiles and Data Roles
Data Security Through Security Profiles
HCM Security Profile Types
Predefined HCM Security Profiles
HCM Security Profiles Best Practices
Key Points for Creating Security Profiles
Creating Security Profiles and Assigning to a New Data Role
Assigning Security Profiles to Existing Roles
Editing Security Profiles
User Management
User Account Creation Scenarios
Maintaining User Accounts
Enterprise-Level User-Management Options
Managing Applications Security Preferences
Implementation Users
Reporting on Users
Role Provisioning
Provisioning Roles to Users: Overview
Defining Role-Provisioning Rules
Role Mappings in Detail
Autoprovisioning
Role-Provisioning Rules for Abstract Roles
Integration with the New Hire Flow
Role-Provisioning Strategies
Role Delegation
HCM Security Management Data Stores, Tools, Tasks, and Processes
HCM Security Management Data Stores
HCM Security Tasks
Synchronization Processes and Preferences
HCM Security Processes
The Security Console
Using the Security Console
Security Console: Overview and Benefits
Running the Import User and Role Application Security Data Process
Launching the Security Console
Using Key Features of the Security Console
Role Visualization
Role Comparison
Security Console Administration Options
Creating Custom Roles on the Security Console
Creating Custom Job and Abstract Roles
Copying Application Roles
Transaction Analysis Duty Roles
Editing Copied Roles
Creating Roles from Scratch
Regenerating Data Roles
HCM Security Deep Dive
Aggregate Privileges and Duty Roles In Detail
Function Security Privileges
Data Security Policy Components
Data Security – Application Role Creation
Data Security – FND_GRANTS Generation
Data Security – Data Role Creation
Data Security in Action
Creating a Custom Duty Role
Tips for Implementing HCM Security
Resilience to Change
Impersonation
Minimizing the Number of Data Roles Using Areas of Responsibility
Defining Areas of Responsibility
Securing Persons Using Custom Criteria
Role Optimization
Security and HCM Reporting
OTBI Security
BI Publisher Security
0.00 average based on 0 ratings