يغطي تدريب Oracle HCM Cloud: Security teaches you about the Oracle HCM Cloud role-based security model. You will gain hands-on experience with the tools used to manage security in Oracle HCM Cloud.
دوراتنا
(25D) Oracle Fusion Cloud HCM: Security
- الرئيسة /
- Oracle Talent الإدارة السحابة /
- (25D) Oracle Fusion Cloud HCM: Security
دورة المحتوى
الأمن نظرة عامة
- Common Questions
- Role-Based Security Model
- Role-Based Security Model: Example
- Role-Based Access Control
- Predefined HCM Roles
- Advisory Note on Subscription Impact
- Role Inheritance
- Role Inheritance Example
- Data Role Inheritance
- User Role Inheritance
- Key Points
- Demonstrations
Roles and Privileges
- Common Questions
- Role Types
- Data Roles
- Abstract Roles
- Job Roles
- Aggregate Privileges
- Aggregate Privileges are Predefined
- Duty Roles
- Examples of Duty Roles
- Role Inheritance Example
- Security Privileges
- Function Security Privileges
- Role Evaluation
- Configuring Security
- Exploring the Security Reference Manuals
- HCM Security Reference Manual
- Key Points
Data Security Overview
- Common Questions
- Data Security Through Security Profiles
- Assigning Security Profiles to Roles
- Security Profiles Example
- HCM Security Profile Types
- Predefined HCM Security Profiles
- HCM Security Profiles: Best Practices
- Approaches to Assigning Security Profiles to Roles
- Assigning Security Profiles to Roles
- Editing Custom Security Profiles
- Previewing HCM Data Security
- Key Points
Security Profiles in Detail
- Common Questions
- Security Profiles Overview
- Security Profile Types
- Security Profiles and HCM Data Roles
- Organization Security Profiles
- Position Security Profiles
- Document Type Security Profiles
- Legislative Data Group Profiles
- Country Profiles
- Payroll Security Profiles
- Payroll Flow Security Profiles
- Element Security Profiles
- Transaction Security Profiles
- Talent Pool Security Profiles
- Job Requisition Security Profiles
- Regenerating Security Profiles
- Key Points
Person Security Profiles
- Common Questions
- Creating Person Security Profiles
- Person Security Profiles: Key Concepts
- Areas of Responsibility
- Predefined Responsibility Types
- Securing Person Records by Area of Responsibility
- Previewing the Person Security Profile
- Creating Public Person Security Profiles
- Key Points
- Practice
Role Provisioning
- Common Questions
- Provisioning Roles to Users: Overview
- Role Provisioning Rules
- Creating a Role Provisioning Rule
- Autoprovisioning Roles
- Role Provisioning Rules for Abstract Roles
- User Account Role Provisioning
- Role Provisioning Strategies
- Key Points
- Practice
Role Delegation
- Common Questions
- Role Delegation
- The Delegator and the Proxy
- Which Roles Can I Delegate?
- Can I Delegate Abstract Roles?
- Enabling a Role for Delegation
- Delegating a Role
- Delegating Approval Tasks
- Delegating Roles Start and End Dates
- Ending Role Delegation
- Delegating Access to Manager Hierarchies
- Key Points
Creating Roles on the Security Console
- Common Questions
- Ways of Creating Job and Abstract Roles
- Copying Roles: Before You Start
- Copying Roles
- Copy Top Role
- Copy Top Role and Inherited Roles
- Copying Roles: Basic Information
- Copying Roles: Saving the Role
- Editing Copied Roles
- Editing Function Security Policies
- How to Regenerate a Data or Abstract Role
- Regenerating Data Security Profiles and Grants Job Set
- Creating Roles from Scratch
- Key Points
- Practices
Using the Security Console
- Common Questions
- Security Console: Overview
- Security Console Actions
- What You Can’t Do on the Security Console
- Before You Use the Security Console
- Assisted Search
- Visualization
- Interacting with the Visualization
- Review of Role Assignments
- Navigator Simulation
- Role Comparison
- Compare Roles
- Compare Users
- Key Points
- Demonstrations
- Practice
Security Console Administration Options and Analytics
- Common Questions
- Administration Options and Analytics Overview
- Setting the Security Console Administration Options
- Location-Based Access
- Single Sign-On
- Single Sign-On: Identity Provider Details
- Certificate Management
- Security Console Analytics for Roles
- Security Console Analytics for Database Resources
- API Authentication
- Key Points
User Accounts
- Common Questions
- User Account Creation and Maintenance Scenarios
- Creating User Accounts
- Creating User Accounts Automatically
- Creating User Accounts In Bulk
- Maintaining User Accounts
- Setting Enterprise-Level Options
- User and Role Provisioning Information
- User Account Creation Option
- User Account Maintenance Option
- User Account Creation for Terminated Workers Option
- Key Points
- Demonstrations
User Management
- Common Questions
- User Categories
- Scenarios for Creating User Categories
- Managing Applications Security Preferences
- Default User Name Format
- Password Policies Examples
- Managing User Name and Password Notifications
- Predefined Notification Templates: Examples
- User Account Locking
- Read-Only Access
- Implementation Users
- Product Family Implementors
- Reporting on Users
- Key Points
- Demonstrations
HCM Security Management Data Stores, Tools, Tasks, and Processes
- Common Questions
- HCM Security Management Data Stores
- Manage Data Roles and Security Profiles
- Access to HCM Security Setup Tasks
- HCM Security Processes
- Key Points
HCM Security Deep Dive
- Common Questions
- Aggregate Privileges and Duty Roles in Detail
- Function Security Privileges
- Data Security Policy Components
- Data Security Policies
- Data Security: Data Role Creation
- Data Security in Action
- Key Points
- Demonstration
- Practices
Tips for Implementing Security
- Common Questions
- Resilience to Change
- Resilience Levels
- Minimizing the Number of Data Roles
- Securing by Areas of Responsibility
- Defining Areas of Responsibility
- Creating Exclusion Rules
- Securing Persons Using Custom Criteria
- Manage Search Access
- Key Points
Security and HCM Reporting
- Common Questions
- Securing OTBI Subject Areas and Folders
- Data Security
- Business Intelligence Roles
- BI Publisher Security
- BI Publisher Roles and Privileges
- BI Publisher Data Security and Secured List Views
- Key Points
- Demonstration
Information Resources
- Information Resources
- Oracle Help Center
- My Oracle Support
- Oracle Cloud Customer Connect
- Oracle University
- Oracle Partner Community
ذات صلة الدورات
(23C) Oracle Fusion السحابة HCM: Analytics Publisher
This Oracle Fusion Cloud HCM: Analytics Publisher training teaches you..
يومان
10 محاضرة
(25B) Oracle Fusion Cloud HCM: Advanced OTBI Techniques
(25B) Oracle Fusion Cloud HCM: Advanced OTBI Techniques..
يوم واحد
6 محاضرات
(25B) Oracle Fusion السحابة HCM: Foundations من OTBI
This Oracle Fusion Cloud HCM: Foundations of OTBI training is..
يومان
10 محاضرة
(21A) Oracle HCM Cloud: Talent Management Project Team Training
This course prepares project teams to implement Oracle HCM Cloud:..
يومان
3 Lectures
(22D) Oracle Fusion Cloud HCM: Career Development
Oracle Fusion Cloud HCM: Career Development..
يوم واحد
3 Lectures
(24C) Oracle Fusion السحابة HCM: Workflows و Approvals
In this Oracle HCM Cloud: Workflows and Approvals training you..