"Transforming Ideas into Innovative Solutions "

Join Now

Security Overview

·       Role-Based Security Model

·       Predefined HCM Roles

·       Role Inheritance

·       Role Types

·       Security Privileges

·       Role Evaluation

·       Customizing Security for Your Needs

 

Security Profiles and Data Roles

·       Data Security Through Security Profiles

·       HCM Security Profile Types

·       Predefined HCM Security Profiles

·       HCM Security Profiles Best Practices

·       Key Points for Creating Security Profiles

·       Creating Security Profiles and Assigning to a New Data Role

·       Assigning Security Profiles to Existing Roles

·       Editing Security Profiles

 

User Management

·       User Account Creation Scenarios

·       Maintaining User Accounts

·       Enterprise-Level User-Management Options

·       Managing Applications Security Preferences

·       Implementation Users

·       Reporting on Users

 

Role Provisioning

·       Provisioning Roles to Users: Overview

·       Defining Role-Provisioning Rules

·       Role Mappings in Detail

·       Autoprovisioning

·       Role-Provisioning Rules for Abstract Roles

·       Integration with the New Hire Flow

·       Role-Provisioning Strategies

·       Role Delegation

 

HCM Security Management Data Stores, Tools, Tasks, and Processes

·       HCM Security Management Data Stores

·       HCM Security Tasks

·       Synchronization Processes and Preferences

·       HCM Security Processes

·       The Security Console

 

Using the Security Console

·       Security Console: Overview and Benefits

·       Running the Import User and Role Application Security Data Process

·       Launching the Security Console

·       Using Key Features of the Security Console

·       Role Visualization

·       Role Comparison

·       Security Console Administration Options

 

Creating Custom Roles on the Security Console

·       Creating Custom Job and Abstract Roles

·       Copying Application Roles

·       Transaction Analysis Duty Roles

·       Editing Copied Roles

·       Creating Roles from Scratch

·       Regenerating Data Roles

 

HCM Security Deep Dive

·       Aggregate Privileges and Duty Roles In Detail

·       Function Security Privileges

·       Data Security Policy Components

·       Data Security - Application Role Creation

·       Data Security - FND_GRANTS Generation

·       Data Security - Data Role Creation

·       Data Security in Action

 

Tips for Implementing HCM Security

·       Resilience to Change

·       Minimizing the Number of Data Roles Using Areas of Responsibility

·       Securing by areas of Responsibility

·       Securing Persons Using Custom Criteria

·       Role Optimization

 

Security and HCM Reporting

·       OTBI Security

·       BI Publisher Security