Oracle HCM Cloud: Security

Course Details
Code: D88709GC50
Tuition (USD): $1,760.00 • Virtual (2 days)
$1,860.00 • Classroom (2 days)

This Oracle HCM Cloud: Security training teaches you about the Oracle HCM Cloud role-based security model. Expert Oracle University instructors help you gain hands-on experience with the UIs used to manage security in Oracle HCM Cloud.

Learn To:

  • Identify and manage the different types of roles, including aggregate privileges and data, abstract, job, and duty roles.
  • Create security profiles to restrict data access.
  • Create data roles and assign security profiles to them.
  • Create role-provisioning rules.
  • Provision roles to users.
  • Create implementation users.
  • Create a job role on the Security Console.
  • Create a duty role on the Security Console.
  • Use the many features of the Security Console.

Benefits to You

By taking this course, you'll learn how to plan and implement security in Oracle HCM Cloud. You'll learn some advanced tips for implementing security, using features such as Areas of Responsibility to minimize the number of data roles you need to create. You'll use the Security Console interface for managing security.

Please Note

This course is beneficial for both Oracle Cloud and on-premises deployments.

Suggested Audience

Skills Gained

  • Identify key components of the Security Reference Implementation
  • Create a new data role and assign security profiles
  • Describe how HCM security works with Oracle's BI Reporting tools
  • Understand role delegation
  • Create a duty role
  • Differentiate the five types of roles used in Oracle Fusion Applications security
  • Describe how user accounts are created and roles are provisioned to users
  • Manage provisioning rules that map roles to users based on their HR assignments
  • Describe the key features of Oracle Fusion Applications security
  • Describe how security policies are generated for roles that inherit a duty role or aggregate privilege
  • Create a job role
  • Understand how to use the Security Console

Who Can Benefit

  • Functional Implementer
  • Implementation Consultant
  • Security Administrators

Course Details

Security Overview

  • Role-Based Security Model
  • Predefined HCM Roles
  • Role Inheritance
  • Role Types
  • Security Privileges
  • Role Evaluation
  • Customizing Security for Your Needs

Security Profiles and Data Roles

  • Data Security Through Security Profiles
  • HCM Security Profile Types
  • Predefined HCM Security Profiles
  • HCM Security Profiles Best Practices
  • Key Points for Creating Security Profiles
  • Creating Security Profiles and Assigning to a New Data Role
  • Assigning Security Profiles to Existing Roles
  • Editing Security Profiles

User Management

  • User Account Creation Scenarios
  • Maintaining User Accounts
  • Enterprise-Level User-Management Options
  • Managing Applications Security Preferences
  • Implementation Users
  • Reporting on Users

Role Provisioning

  • Provisioning Roles to Users: Overview
  • Defining Role-Provisioning Rules
  • Role Mappings in Detail
  • Autoprovisioning
  • Role-Provisioning Rules for Abstract Roles
  • Integration with the New Hire Flow
  • Role-Provisioning Strategies
  • Role Delegation

HCM Security Management Data Stores, Tools, Tasks, and Processes

  • HCM Security Management Data Stores
  • HCM Security Tasks
  • Synchronization Processes and Preferences
  • HCM Security Processes
  • The Security Console

Using the Security Console

  • Security Console: Overview and Benefits
  • Running the Import User and Role Application Security Data Process
  • Launching the Security Console
  • Using Key Features of the Security Console
  • Role Visualization
  • Role Comparison
  • Security Console Administration Options

Creating Custom Roles on the Security Console

  • Creating Custom Job and Abstract Roles
  • Copying Application Roles
  • Transaction Analysis Duty Roles
  • Editing Copied Roles
  • Creating Roles from Scratch
  • Regenerating Data Roles

HCM Security Deep Dive

  • Aggregate Privileges and Duty Roles In Detail
  • Function Security Privileges
  • Data Security Policy Components
  • Data Security - Application Role Creation
  • Data Security - FND_GRANTS Generation
  • Data Security - Data Role Creation
  • Data Security in Action
  • Creating a Custom Duty Role

Tips for Implementing HCM Security

  • Resilience to Change
  • Impersonation
  • Minimizing the Number of Data Roles Using Areas of Responsibility
  • Defining Areas of Responsibility
  • Securing Persons Using Custom Criteria
  • Role Optimization

Security and HCM Reporting

  • OTBI Security
  • BI Publisher Security