Security
Overview
·
Role-Based Security Model
·
Predefined HCM Roles
·
Role Inheritance
·
Role Types
·
Security Privileges
·
Role Evaluation
·
Customizing Security for Your Needs
Security
Profiles and Data Roles
·
Data Security Through Security Profiles
·
HCM Security Profile Types
·
Predefined HCM Security Profiles
·
HCM Security Profiles Best Practices
·
Key Points for Creating Security Profiles
·
Creating Security Profiles and Assigning to a New Data Role
·
Assigning Security Profiles to Existing Roles
·
Editing Security Profiles
User Management
·
User Account Creation Scenarios
·
Maintaining User Accounts
·
Enterprise-Level User-Management Options
·
Managing Applications Security Preferences
·
Implementation Users
·
Reporting on Users
Role
Provisioning
·
Provisioning Roles to Users: Overview
·
Defining Role-Provisioning Rules
·
Role Mappings in Detail
·
Autoprovisioning
·
Role-Provisioning Rules for Abstract Roles
·
Integration with the New Hire Flow
·
Role-Provisioning Strategies
·
Role Delegation
HCM Security
Management Data Stores, Tools, Tasks, and Processes
·
HCM Security Management Data Stores
·
HCM Security Tasks
·
Synchronization Processes and Preferences
·
HCM Security Processes
·
The Security Console
Using the
Security Console
·
Security Console: Overview and Benefits
·
Running the Import User and Role Application Security Data Process
·
Launching the Security Console
·
Using Key Features of the Security Console
·
Role Visualization
·
Role Comparison
·
Security Console Administration Options
Creating
Custom Roles on the Security Console
·
Creating Custom Job and Abstract Roles
·
Copying Application Roles
·
Transaction Analysis Duty Roles
·
Editing Copied Roles
·
Creating Roles from Scratch
·
Regenerating Data Roles
HCM Security
Deep Dive
·
Aggregate Privileges and Duty Roles In Detail
·
Function Security Privileges
·
Data Security Policy Components
·
Data Security - Application Role Creation
·
Data Security - FND_GRANTS Generation
·
Data Security - Data Role Creation
·
Data Security in Action
Tips for
Implementing HCM Security
·
Resilience to Change
·
Minimizing the Number of Data Roles Using Areas of Responsibility
·
Securing by areas of Responsibility
·
Securing Persons Using Custom Criteria
·
Role Optimization
Security and
HCM Reporting
·
OTBI Security
· BI Publisher Security