Our Courses

(25D) Oracle Fusion Cloud HCM: Security

About This Course

This Oracle HCM Cloud: Security training teaches you about the Oracle HCM Cloud role-based security model. You will gain hands-on experience with the tools used to manage security in Oracle HCM Cloud.

2 Days

17 Lectures

Copied

Course Content

Security Overview

  • Common Questions
  • Role-Based Security Model
  • Role-Based Security Model: Example
  • Role-Based Access Control
  • Predefined HCM Roles
  • Advisory Note on Subscription Impact
  • Role Inheritance
  • Role Inheritance Example
  • Data Role Inheritance
  • User Role Inheritance
  • Key Points
  • Demonstrations

Roles and Privileges

  • Common Questions
  • Role Types
  • Data Roles
  • Abstract Roles
  • Job Roles
  • Aggregate Privileges
  • Aggregate Privileges are Predefined
  • Duty Roles
  • Examples of Duty Roles
  • Role Inheritance Example
  • Security Privileges
  • Function Security Privileges
  • Role Evaluation
  • Configuring Security
  • Exploring the Security Reference Manuals
  • HCM Security Reference Manual
  • Key Points

Data Security Overview

  • Common Questions
  • Data Security Through Security Profiles
  • Assigning Security Profiles to Roles
  • Security Profiles Example
  • HCM Security Profile Types
  • Predefined HCM Security Profiles
  • HCM Security Profiles: Best Practices
  • Approaches to Assigning Security Profiles to Roles
  • Assigning Security Profiles to Roles
  • Editing Custom Security Profiles
  • Previewing HCM Data Security
  • Key Points

Security Profiles in Detail

  • Common Questions
  • Security Profiles Overview
  • Security Profile Types
  • Security Profiles and HCM Data Roles
  • Organization Security Profiles
  • Position Security Profiles
  • Document Type Security Profiles
  • Legislative Data Group Profiles
  • Country Profiles
  • Payroll Security Profiles
  • Payroll Flow Security Profiles
  • Element Security Profiles
  • Transaction Security Profiles
  • Talent Pool Security Profiles
  • Job Requisition Security Profiles
  • Regenerating Security Profiles
  • Key Points

Person Security Profiles

  • Common Questions
  • Creating Person Security Profiles
  • Person Security Profiles: Key Concepts
  • Areas of Responsibility
  • Predefined Responsibility Types
  • Securing Person Records by Area of Responsibility
  • Previewing the Person Security Profile
  • Creating Public Person Security Profiles
  • Key Points
  • Practice

Role Provisioning

  • Common Questions
  • Provisioning Roles to Users: Overview
  • Role Provisioning Rules
  • Creating a Role Provisioning Rule
  • Autoprovisioning Roles
  • Role Provisioning Rules for Abstract Roles
  • User Account Role Provisioning
  • Role Provisioning Strategies
  • Key Points
  • Practice

Role Delegation

  • Common Questions
  • Role Delegation
  • The Delegator and the Proxy
  • Which Roles Can I Delegate?
  • Can I Delegate Abstract Roles?
  • Enabling a Role for Delegation
  • Delegating a Role
  • Delegating Approval Tasks
  • Delegating Roles Start and End Dates
  • Ending Role Delegation
  • Delegating Access to Manager Hierarchies
  • Key Points

Creating Roles on the Security Console

  • Common Questions
  • Ways of Creating Job and Abstract Roles
  • Copying Roles: Before You Start
  • Copying Roles
  • Copy Top Role
  • Copy Top Role and Inherited Roles
  • Copying Roles: Basic Information
  • Copying Roles: Saving the Role
  • Editing Copied Roles
  • Editing Function Security Policies
  • How to Regenerate a Data or Abstract Role
  • Regenerating Data Security Profiles and Grants Job Set
  • Creating Roles from Scratch
  • Key Points
  • Practices

Using the Security Console

  • Common Questions
  • Security Console: Overview
  • Security Console Actions
  • What You Can’t Do on the Security Console
  • Before You Use the Security Console
  • Assisted Search
  • Visualization
  • Interacting with the Visualization
  • Review of Role Assignments
  • Navigator Simulation
  • Role Comparison
  • Compare Roles
  • Compare Users
  • Key Points
  • Demonstrations
  • Practice

Security Console Administration Options and Analytics

  • Common Questions
  • Administration Options and Analytics Overview
  • Setting the Security Console Administration Options
  • Location-Based Access
  • Single Sign-On
  • Single Sign-On: Identity Provider Details
  • Certificate Management
  • Security Console Analytics for Roles
  • Security Console Analytics for Database Resources
  • API Authentication
  • Key Points

User Accounts

  • Common Questions
  • User Account Creation and Maintenance Scenarios
  • Creating User Accounts
  • Creating User Accounts Automatically
  • Creating User Accounts In Bulk
  • Maintaining User Accounts
  • Setting Enterprise-Level Options
  • User and Role Provisioning Information
  • User Account Creation Option
  • User Account Maintenance Option
  • User Account Creation for Terminated Workers Option
  • Key Points
  • Demonstrations

User Management

  • Common Questions
  • User Categories
  • Scenarios for Creating User Categories
  • Managing Applications Security Preferences
  • Default User Name Format
  • Password Policies Examples
  • Managing User Name and Password Notifications
  • Predefined Notification Templates: Examples
  • User Account Locking
  • Read-Only Access
  • Implementation Users
  • Product Family Implementors
  • Reporting on Users
  • Key Points
  • Demonstrations

HCM Security Management Data Stores, Tools, Tasks, and Processes

  • Common Questions
  • HCM Security Management Data Stores
  • Manage Data Roles and Security Profiles
  • Access to HCM Security Setup Tasks
  • HCM Security Processes
  • Key Points

HCM Security Deep Dive

  • Common Questions
  • Aggregate Privileges and Duty Roles in Detail
  • Function Security Privileges
  • Data Security Policy Components
  • Data Security Policies
  • Data Security: Data Role Creation
  • Data Security in Action
  • Key Points
  • Demonstration
  • Practices

Tips for Implementing Security

  • Common Questions
  • Resilience to Change
  • Resilience Levels
  • Minimizing the Number of Data Roles
  • Securing by Areas of Responsibility
  • Defining Areas of Responsibility
  • Creating Exclusion Rules
  • Securing Persons Using Custom Criteria
  • Manage Search Access
  • Key Points

Security and HCM Reporting

  • Common Questions
  • Securing OTBI Subject Areas and Folders
  • Data Security
  • Business Intelligence Roles
  • BI Publisher Security
  • BI Publisher Roles and Privileges
  • BI Publisher Data Security and Secured List Views
  • Key Points
  • Demonstration

Information Resources

  • Information Resources
  • Oracle Help Center
  • My Oracle Support
  • Oracle Cloud Customer Connect
  • Oracle University
  • Oracle Partner Community

Related Courses