Security Overview
Role-Based Security Model
Predefined HCM Roles
Role Inheritance
Role Types
Security Privileges
Security Component Terminology Comparison
Role Evaluation
Customizing Security for Your Needs
Security Profiles and Data Roles
Data Security Through Security Profiles
HCM Security Profile Types
Predefined HCM Security Profiles
HCM Security Profiles Best Practices
Key Points for Creating Security Profiles
Creating Security Profiles and Assigning to a New Data Role
Assigning Security Profiles to Existing Roles
Editing Security Profiles
User Management
User Account Creation Scenarios
Maintaining User Accounts
Enterprise-Level User-Management Options
Implementation Users
Reporting on Users
Role Provisioning
Provisioning Roles to Users: Overview
Defining Role-Provisioning Rules
Role Mappings in Detail
Autoprovisioning
Role-Provisioning Rules for Abstract Roles
Integration with the New Hire Flow
Role-Provisioning Strategies
Role Delegation
HCM Security Management Data Stores, Tools, Tasks, and Processes
Oracle Fusion Middleware: Overview
HCM Security Management Data Stores
Fusion Applications, OIM, and APM Terminology Differences
R10 Job and Abstract Roles in APM
HCM Security Tasks
HCM Security Processes
The Security Console
Accessing OIM and APM
Using the Security Console
Security Console: Overview and Benefits
Running the Import User and Role Application Security Data Process
Launching the Security Console
Using Key Features of the Security Console
Role Visualization
Role Comparison
Setting Security Console Profile Options
Creating Custom Roles on the Security Console
External Roles and Application Roles
Copying Application Roles
Reviewing Roles in All Application Stripes
Creating External Roles for Copied Application Roles
Editing Copied Roles
Creating Roles from Scratch
Running Retrieve Latest LDAP Changes
Regenerating Data Roles
HCM Security Deep Dive
Aggregate Privileges and Duty Roles In Detail
Function Security Privileges
Data Security Policy Components
Data Security - Application Role Creation
Data Security - FND_GRANTS Generation
Data Security - Data Role Creation
Data Security in Action
Creating a Custom Duty Role
Tips for Implementing HCM Security
Resilience to Change
Impersonation
Minimizing the Number of Data Roles Using Areas of Responsibility
Defining a Dynamic Data Role
Role Optimization
Security and HCM Reporting
OTBI Security
BI Publisher Security
Single Sign-On
What is Single Sign-On?
Single Sign-On Components
How Single Sign-On Works
Technical View
Single Sign-On Terminology
Single Sign-On Patterns
Implementation Scenarios
Description:
This Oracle HCM Cloud: Security training teaches you about the Oracle HCM Cloud role-based security model. Expert
Oracle University instructors help you gain hands-on experience with the UIs used to manage security in Oracle HCM
Cloud.
Learn To:
Identify and manage the different types of roles, including aggregate privileges and data, abstract, job, and duty roles.
Create security profiles to restrict data access.
Create data roles and assign security profiles to them.
Create role-provisioning rules.
Provision roles to users.
Create implementation users.
Create a custom job role on the Security Console.
Create a custom duty role on the Security Console.
Use the many features of the Security Console.
Benefits to You
By taking this course, you'll learn how to plan and implement security in Oracle HCM Cloud. You'll learn some advanced
tips for implementing security, using features such as Areas of Responsibility to minimize the number of data roles you
need to create. You'll use the Security Console, the new interface for managing security.
Please Note
This course is relevant for any customers using Oracle Fusion Applications through Release 11.1.11. It's beneficial for
both Oracle Cloud and on-premises deployments.