Oracle HCM Cloud: Security

Überblick

This Oracle HCM Cloud: Security training teaches you about the Oracle HCM Cloud role-based security model. Expert Oracle University instructors help you gain hands-on experience with the UIs used to manage security in Oracle HCM Cloud.

Learn To:
  • Identify and manage the different types of roles, including aggregate privileges and data, abstract, job, and duty roles.
  • Create security profiles to restrict data access.
  • Create data roles and assign security profiles to them.
  • Create role-provisioning rules.
  • Provision roles to users.
  • Create implementation users.
  • Create a custom job role on the Security Console.
  • Create a custom duty role on the Security Console.
  • Use the many features of the Security Console.
Benefits to You

By taking this course, you'll learn how to plan and implement security in Oracle HCM Cloud. You'll learn some advanced tips for implementing security, using features such as Areas of Responsibility to minimize the number of data roles you need to create. You'll use the Security Console interface for managing security.

Please Note

This course is relevant for any customers using Oracle Fusion Applications Release 11.1.12. It's beneficial for both Oracle Cloud and on-premises deployments.

 

Individueller Schulungseinstieg mit Oracle Training On Demand

Online-Training über das Internet, verfügbar rund um die Uhr, an sieben Tagen die Woche. Sie greifen auf gestreamte Vorträge zu, Whiteboards und Lab-Aktivitäten, können im Video suchen, es unterbrechen oder zurückspulen. Es handelt sich hierbei um aufgezeichnete Kurse. Der Zugang wird nur registrierten Benutzern gewährt (Named-User-Basis). Sie haben ab Wirksamkeitsdatum der Buchung 90 Tage Zugriff auf die Kurse.

Zielgruppe

  • Implementation Consultant
  • Functional Implementer
  • Security Administrators

Voraussetzungen

Kursziele

  • Differentiate the five types of roles used in Oracle Fusion Applications security
  • Identify key components of the Security Reference Implementation
  • Create a new data role and assign security profiles
  • Describe how user accounts are created and roles are provisioned to users
  • Manage provisioning rules that map roles to users based on their HR assignments
  • Describe the key features of Oracle Fusion Applications security
  • Describe how security policies are generated for roles that inherit a duty role or aggregate privilege
  • Create a custom job role
  • Understand how to use the Security Console
  • Describe how HCM security works with Oracle's BI Reporting tools
  • Understand role delegation
  • Create a custom duty role

Produktbeschreibung

  • Security Overview
  • Security Profiles and Data Roles
  • User Management
  • Role Provisioning
  • HCM Security Management Data Stores, Tools, Tasks, and Processes
  • Using the Security Console
  • Creating Custom Roles on the Security Console
  • HCM Security Deep Dive
  • Tips for Implementing HCM Security
  • Security and HCM Reporting

Outline

Security Overview
  • Role-Based Security Model
  • Predefined HCM Roles
  • Role Inheritance
  • Role Types
  • Security Privileges
  • Role Evaluation
  • Customizing Security for Your Needs
Security Profiles and Data Roles
  • Data Security Through Security Profiles
  • HCM Security Profile Types
  • Predefined HCM Security Profiles
  • HCM Security Profiles Best Practices
  • Key Points for Creating Security Profiles
  • Creating Security Profiles and Assigning to a New Data Role
  • Assigning Security Profiles to Existing Roles
  • Editing Security Profiles
User Management
  • User Account Creation Scenarios
  • Maintaining User Accounts
  • Enterprise-Level User-Management Options
  • Managing Applications Security Preferences
  • Implementation Users
  • Reporting on Users
Role Provisioning
  • Provisioning Roles to Users: Overview
  • Defining Role-Provisioning Rules
  • Role Mappings in Detail
  • Autoprovisioning
  • Role-Provisioning Rules for Abstract Roles
  • Integration with the New Hire Flow
  • Role-Provisioning Strategies
  • Role Delegation
HCM Security Management Data Stores, Tools, Tasks, and Processes
  • HCM Security Management Data Stores
  • HCM Security Tasks
  • Synchronization Processes and Preferences
  • HCM Security Processes
  • The Security Console
Using the Security Console
  • Security Console: Overview and Benefits
  • Running the Import User and Role Application Security Data Process
  • Launching the Security Console
  • Using Key Features of the Security Console
  • Role Visualization
  • Role Comparison
  • Security Console Administration Options
Creating Custom Roles on the Security Console
  • Creating Custom Job and Abstract Roles
  • Copying Application Roles
  • Transaction Analysis Duty Roles
  • Editing Copied Roles
  • Creating Roles from Scratch
  • Regenerating Data Roles
HCM Security Deep Dive
  • Aggregate Privileges and Duty Roles In Detail
  • Function Security Privileges
  • Data Security Policy Components
  • Data Security - Application Role Creation
  • Data Security - FND_GRANTS Generation
  • Data Security - Data Role Creation
  • Data Security in Action
  • Creating a Custom Duty Role
Tips for Implementing HCM Security
  • Resilience to Change
  • Impersonation
  • Minimizing the Number of Data Roles Using Areas of Responsibility
  • Defining Areas of Responsibility
  • Securing Persons Using Custom Criteria
  • Role Optimization
Security and HCM Reporting
  • OTBI Security
  • BI Publisher Security
E-Learning Oracle Training on Demand
Preis (exkl. MwSt.)
  • CHF 1'728.–

Nutzungsdauer: 2 Tage