Browser version scriptSkip Headers

Oracle® Fusion Applications Security Guide
11g Release 1 (11.1.2)
Part Number E16689-02
Go to contents  page
Contents
Go to Previous  page
Previous
Go to previous page
Next

2 Security Tasks

This chapter contains the following:

Security Tasks: Highlights

Security Tasks and Oracle Fusion Applications: How They Fit Together

Security Setup Tasks: How They Fit Together

Initial Security Administration: Critical Choices

Defining Security After Enterprise Setup: Points to Consider

Defining Data Security After Enterprise Setup: Points to Consider

Defining Trading Partner Security After Enterprise Setup: Points to Consider

Security Tasks After Enterprise Changes: Points To Consider

Top Security Tasks

FAQs for Security Tasks

Security Tasks: Highlights

Security tasks include the following.

Note

Perform security tasks in the integrated Oracle Fusion Applications user interfaces that are provided by the following products.

Security administrative tasks performed by product administrators and implementation consultants, such as managing HCM security profiles, are presented in the documentation for those products.

Prerequisite Tasks for Security Administration

Sign into Oracle Fusion Applications for the first time with the super user account to create an IT security manager user account and provision it with the IT Security Manager role. With that account, perform the required security administration tasks.

Required Security Administration Tasks

Establish at least one implementation user and provision that user with sufficient access to set up the enterprise for all integrated Oracle Fusion Middleware and all application pillars or partitions. Initial security administration includes creating an implementation user, creating a data role for setting up HCM, and provisioning the implementation user with that data role so that the enterprise can be set up with Human Resources (HR) structures. Setup of business units, accounting structures, reference data sets, and so on does not require creation of an HCM administrator data role.

Optional Security Administration Tasks

Once initial security administration is complete and your enterprise is set up with structures such as business units, additional security administration tasks are optional and based on modifying and expanding the predefined security reference implementation to fit your enterprise. See points to consider for defining security, data security and trading partner security after enterprise setup.

Security Tasks and Oracle Fusion Applications: How They Fit Together

The major security tasks and their order within the context of an overall Oracle Fusion Applications implementation extend from security setup through production deployment audits.

The Oracle Fusion business process model (BPM) provides a sequence of security implementation tasks that includes the following.

Note

Go live deployment does not require lockdown or specific security tasks because security is enforced across the test to production information life cycle.

Required Roles

The Oracle Fusion Applications installation process sets up a single, super user provisioned with the following enterprise roles.

Additionally, provision the super user with the following roles to enable user and role administration in Oracle Identity Management (OIM) and the Authorization Policy Manager (APM).

Important

As a security guideline, provision a dedicated security professional with the IT Security Manager role as soon as possible after initial security setup and revoke that role from users provisioned with the Application Implementation Consultant role.

The user provisioned with the IT Security Manager role should additionally be provisioned with the following roles.

Provision these roles to the IT security manager using the XELSYSADM user in OIM.

Tools Used to Perform Security Tasks

Security tasks are supported by tools within both Oracle Fusion Applications and Oracle Fusion Middleware.

The figure lists the tasks associated with each of the integrated products and pillars of an Oracle Fusion Applications deployment.

The Oracle Fusion Applications tier
contains Oracle Fusion HCM, General Ledger, Procurement, and Payments.
The Oracle Fusion Middleware provides products in support of common
tasks across applications. The Access Control Governor provides tasks
in support of segregation of duties.

Security Setup Tasks: How They Fit Together

Set up security before and after setting up the enterprise with enterprise structures.

Perform security tasks in the integrated Oracle Fusion Applications user interfaces that are provided by the following products.

To define data security, administrators and implementation users additionally access integrated user interfaces provided by several products, including the following.

Manage users and enterprise role hierarchies in OIM. Manage roles, including duty roles, in APM. Perform supplier role setup tasks for trading partner security in Supplier Portal. Application administrators perform user and role provisioning tasks within applications such as HCM, General Ledger, and Supplier Portal.

Initial Security Setup

The following table shows initial security setup tasks in a likely order, as well as the conditions and purposes of the tasks and where in the user interface these tasks are performed.


Task

Condition

Purpose

Performed In

Create Implementation Users

None

Create user accounts for implementation users.

OIM

Create Data Role for Implementation Users

None

Create a View All data role, such as a Human Capital Management Application Administrator data role. This data role is based on the Human Capital Management Application Administrator job role and combines the entitlements that have been granted to that role with unrestricted access to data in the secured objects that the role is authorized to access.

Perform the Provision Roles to Implementation Users task in OIM to provision this data role to the implementation user who will perform all of the HCM setup steps.

HCM

Provision Roles to Implementation Users

None

Provision implementation users with roles. Application Implementation Consultant, IT Security Manager, and product family Application Administrator job or data roles may be assigned to implementation users.

OIM

Revoke Data Role from Implementation Users

None

Revoke any View All data roles after setup is complete.

OIM

Security Setup During Enterprise Setup

When setting up the enterprise with structures such as business units, data roles are automatically generated that inherit job roles based on data role templates. Data roles also can be generated based on HCM security profiles. Data role templates and HCM security profiles enable defining the instance sets specified in data security policies.

Additional Security Setup After Enterprise Setup

An HCM application administrator or application implementation consultant sets up enterprise structures, such as business units and ledgers, using Define Common Application Configuration activities. After the enterprise has been set up, you can proceed with the following security setup tasks.

The following table shows the tasks in a likely order, as well as the conditions and purposes of the tasks and where in the user interface these tasks are performed.


Task

Condition

Purpose

Performed In

Import Worker Users

Users or workers are in legacy applications.

If your enterprise has users in legacy applications, use a data load process to import user identities from legacy applications. If there are no legacy users, user accounts are created when workers are imported by performing the Import Workers task in HCM.

OIM

Import Partner Users

  • CRM is provisioned

  • Partner users are in legacy applications

If your enterprise has partner users in legacy applications, use a data load process to import partner identities from legacy applications.

OIM

Manage Job Roles

None

Manage job and abstract (enterprise) roles.

OIM

Manage Duties

None

Manage duty (application) roles and provision to job roles.

APM

Manage Application Access Controls

None

Manage segregation of duties policies.

AACG

Manage Data Access Sets

GL is provisioned.

Define access sets for ledgers and ledger sets.

GL

Manage Segment Security

GL is provisioned.

Manage accounting flexfield segment security rules.

GL

Manage Data Security Policies

Product families other than HCM are provisioned.

Manage data security grants to roles.

APM

Manage Role Templates

None

Manage templates to automatically create or update data roles based on a dimension such as business unit.

APM

Manage Encryption Keys

Oracle Fusion Payments is provisioned.

Create or edit encryption keys held in Oracle Wallet. Encryption keys are used to secure personally identifiable information (PII) attributes.

Payments

Manage Supplier User Roles

Supplier Portal in Procurement is provisioned and requires trading partner security.

Manage roles that can be provisioned to supplier users.

Supplier Portal or Sourcing

Manage Supplier User Role Usages

Supplier Portal in Procurement is provisioned and requires trading partner security.

Manage the supplier roles that can be provisioned by supplier users, and set default roles for Supplier Portal or Sourcing, based on the set of supplier roles that are defined by performing the Manage Supplier User Roles task.

Supplier Portal or Sourcing

For information about provisioning application identities to meet the conditions necessary for some tasks to be available, see the Oracle Fusion Applications Administrator's Guide.

Initial Security Administration: Critical Choices

Initial security administration is performed by an administrative user who is created and provisioned with the IT Security Manager role.

Note

The Oracle Fusion Applications installation process creates a super user account, which is available for signing into Oracle Fusion Applications to create a user provisioned with the IT Security Manager role.

Initial security administration primarily establishes at least one implementation user. The IT security manager must provision the initial implementation user with sufficient access to set up the enterprise, including provisioning of the Application Implementation Consultant role to the implementation users.

Perform the following tasks to establish implementation users with appropriate access.

Creating Implementation Users

Create one or more implementation users by performing the Create Implementation Users task in Oracle Identity Management (OIM). An implementation user must exist to set up the enterprise in Oracle Fusion Applications.

Note

User and user account information is stored in the Lightweight Directory Access Protocol (LDAP) store. The implementation user does not need to be associated with a person in Human Resources (HR).

In the security reference implementation, the IT Security Manager job role hierarchy includes the User Management Duty role, which is entitled to create and manage users (the entitlement is Manage User Principal). This entitlement provides the access necessary to perform the Create Implementation Users task in OIM.

Creating a Data Role for Performing HCM Setup Steps

No predefined roles exist in the Oracle Fusion Applications security reference implementation to access the data necessary for setting up the HCM structures of the enterprise.

Setting up the HCM structures includes the following.

These setup tasks are commonly done by application implementation consultants with administrator access, for example an HCM Application Administrator View All data role.

Note

Administrator and implementation roles of the Oracle Fusion Applications security reference implementation are defined to access all other elements of the enterprise that need to be set up, such as the following.

Creating a Data Role for Implementation Users

Create a Human Capital Management Application Administrator View All data role.

This data role is based on the Human Capital Management Application Administrator job role and extends that role with unrestricted access to data in the secured objects that the role is authorized to access. Users assigned to this data role can perform all of the HCM setup steps.

Caution

Once an implementation user with a View All data role has completed HCM security setup, it may be prudent to revoke the role and provision it only when specific HCM security setup changes are necessary. A View All data role grants broad access to all business units, reference data sets, and so on. Security setup in other offerings are not data security enabled and do not require a View All data role for enterprise setup.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Data Role Management Duty role, which is entitled to create a data role for Human Capital Management Application Administrator (the entitlement is Manage HCM Data Role). This entitlement provides the access necessary to perform the Create Data Role for Implementation Users task in Oracle Fusion Global Human Resources.

Provisioning Roles to Implementation Users

Provision the implementation user with one or more roles by performing the Provision Roles to Implementation Users task in Oracle Identity Manager (OIM).

For example, assign a role to the implementation user that provides the access necessary for setting up the enterprise, such as an HCM Application Administrator View All data role. Depending on the implementation, provision the predefined Applications Implementation Consultant role or a product family-specific administrator role, such as the predefined Financials Applications Administrator, to the implementation user. These predefined roles are available for selection in OIM.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Identity User Administrators and Role Administrators roles, which entitle you to provision users with roles. This entitlement provides the access necessary to perform the Provision Roles to Implementation Users task in OIM.

Defining Security After Enterprise Setup: Points to Consider

After the implementation user has set up the enterprise, further security administration depends on the requirements of your enterprise.

The Define Security activity within the Information Technology (IT) Management business process includes the following tasks.

If no legacy users, user accounts, roles, and role memberships are available in the Lightweight Directory Access Protocol (LDAP) store, and no legacy workers are available in Human Resources (HR), the implementation user sets up new users and user accounts and provisions them with roles available in the Oracle Fusion Applications reference implementation.

If no legacy identities (workers, suppliers, customers) exist to represent people in your enterprise, implementation users can create new identities in Human Capital Management (HCM), Supplier Portal, and Customer Relationship Management (CRM) Self Service, respectively, and associate them with users.

Before Importing Users

Oracle Identity Management (OIM) handles importing users.

If legacy employees, contingent workers, and their assignments exist, the HCM Application Administrator imports these definitions by performing the Load Batch Data task. If user and role provisioning rules have been defined, the Load Batch Data process automatically creates user and role provisioning requests as the workers are created.

Once the enterprise is set up, performing the Load Batch Data task populates the enterprise with HR workers in records linked by global user ID (GUID) to corresponding user accounts in the LDAP store. If no user accounts exist in the LDAP store, the Load Batch Data task results in new user accounts being created. Worker email addresses as an alternate input for the Load Batch Data task triggers a search of the LDAP for user GUIDs, which may perform more slowly than entering user names.

In the security reference implementation, the HCM Application Administrator job role hierarchy includes the HCM Batch Data Loading Duty role, which is entitled to import worker identities. This entitlement provides the access necessary to perform the Load Batch Data task in HCM.

Note

The Import Person and Organization task in the Define Trading Community Import activity imports the following resources, creates users, and links the resources to users for use in CRM.

If role provisioning rules have been defined, the Import Person and Organization task automatically provisions role requests as the users are created.

Import Users

If legacy users (identities) and user accounts exist outside the LDAP store that is being used by the Oracle Fusion Applications installation, the IT security manager has the option to import these definitions to the LDAP store by performing the Import Worker Users and Import Partner Users tasks.

If no legacy users or user accounts can be imported or exist in an LDAP repository accessible to Oracle Identity Management (OIM), the IT security manager creates users manually in OIM or uses the Load Batch Data task to create users from imported HR workers.

Once users exist, their access to Oracle Fusion Applications is dependent on the roles provisioned to them in OIM or Human Capital Management. Use the Manage HCM Role Provisioning Rules task to define rules that determine what roles are provisioned to users.

Importing user identities from other applications, including other Oracle Applications product lines, is either a data migration or manual task. Migrating data from other Oracle Applications includes user data. For more information about importing users, see the Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager.

In the security reference implementation, the IT Security Manager job role hierarchy includes the HCM Batch Data Loading Duty and the Partner Account Administration Duty. These duty roles provide entitlement to import or create users. The entitlement Load Batch Data provides the access necessary to perform the Import Worker Users task in OIM. The entitlement Import Partner entitlement provides the access necessary to perform the Import Partner Users task in OIM.

Manage Job Roles

Job and abstract roles are managed in OIM. This task includes creating and modifying job and abstract roles, but not managing role hierarchies of duties for the jobs.

Note

Manage Job Roles does not include provisioning job roles to users. Provisioning users is done in OIM, HCM, CRM or Oracle Fusion Supplier Portal.

Roles control access to application functions and data. Various types of roles identify the functions performed by users.

The Oracle Fusion Applications security reference implementation provides predefined job and abstract roles. In some cases, the jobs defined in your enterprise may differ from the predefined job roles in the security reference implementation. The predefined roles and role hierarchies in Oracle Fusion may require changes or your enterprise may require you to create new roles. For example, you need a job role for a petty cash administrator, in addition to an accounts payable manager. The security reference implementation includes a predefined Accounts Payable Manager, and you can create a petty cash administrator role to extend the reference implementation.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Enterprise Role Management Duty role, which is entitled to manage job and abstract roles (the entitlement is Manage Enterprise Role). This entitlement provides the access necessary to perform the Manage Job Roles task in OIM.

Manage Duties

A person with a job role must be able to perform certain duties. In the Oracle Fusion Applications security reference implementation, enterprise roles inherit duties through a role hierarchy. Each duty corresponds to a duty role. Duty roles specify the duties performed within applications and define the function and data access granted to the enterprise roles that inherit the duty roles.

Managing duties includes assigning duties to job and abstract roles in a role hierarchy using Authorization Policy Manager (APM). If your enterprise needs users to perform some actions in applications coexistent with Oracle Fusion applications, you may wish to remove the duty roles that enable those actions. For details about which duty roles are specific to the products in an offering, see the Oracle Fusion Applications Security Reference Manual for each offering.

OIM stores the role hierarchy and the spanning of roles across multiple pillars or logical partitions of applications.

In cases where your enterprise needs to provide access to custom functions, it may be necessary to create or modify the duty roles of the reference implementation.

Tip

As a security guideline, use only the predefined duty roles, unless you have added new applications functions. The predefined duty roles fully represent the functions and data that must be accessed by application users and contain all appropriate entitlement. The predefined duty roles are inherently without segregation of duty violations of the constraints used by the Application Access Controls Governor.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Application Role Management Duty role, which is entitled to manage duty roles (the entitlement is Manage Application Role). This entitlement provides the access necessary to perform the Manage Duties task in APM.

Note

Product family administrators are not entitled to create role hierarchies or manage duty roles and must work with the IT security manager to make changes such as localizing a duty role to change a role hierarchy. Setup for localizations is documented in HCM documentation.

Manage Application Access Controls

Prevent or limit the business activities that a single person may initiate or validate by managing segregation of duties policies in the Application Access Controls Governor (AACG) .

Note

In AACG, segregation of duties policies are called access controls or segregation of duties controls.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Segregation of Duties Policy Management Duty role, which is entitled to manage segregation of duties policies (the entitlement is Manage Segregation of Duties Policy). This entitlement provides the access necessary to perform the Manage Application Access Controls task in AACG.

Defining Data Security After Enterprise Setup: Points to Consider

After the implementation user has set up the enterprise, further security administration depends on the requirements of your enterprise.

The Define Data Security activity within the Information Technology (IT) Management business process includes the following tasks.

These tasks address data security administration. For information on using the user interface pages for setting up and managing data security, see the Oracle Fusion Middleware Administrator's Guide for Authorization Policy Manager (Oracle Fusion Applications edition).

Note

The Manage Data Role and Security Profiles task, and all other HCM security profile setup tasks are documented in Human Capital Management (HCM) documentation.

Manage Data Access Sets

Data access sets define a set of access privileges to one or more ledgers or ledger sets.

The information on ledgers that are attached to data access sets are secured by function security. Users must have access to the segment values associated with the data access sets to access the corresponding GL account.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Data Access Administration Duty role, which is entitled to manage data access sets (the entitlement is Define General Ledger Data Access Set). This entitlement provides the access necessary to perform the Manage Data Access Sets task in General Ledger.

Manage Segment Security

Balancing or management segment values can secure data within a ledger.

Segment values are stored in GL_ACCESS_SET_ASSIGNMENTS and secured by restrictions, such as Exclude, on parameters that control the set of values that a user can use during data entry.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Application Key Flexfield Administration Duty role, which is entitled to manage application key flexfields (the entitlement is Manage Application Key Flexfield). This entitlement provides the access necessary to perform the Manage Segment Security task in General Ledger.

Manage Role Templates

Data role templates automatically create or update data roles based on dimensions such as business unit. As an enterprise expands, data role templates trigger replication of roles for added dimensions. For example, when creating a new business unit, a data role template generates a new Accounts Payables Manager data role based on the Financials Common Module Template for Business Unit Security data role template.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Application Role Management Duty role, which is entitled to manage data role templates (the entitlement is Manage Role Template). This entitlement provides the access necessary to perform the Manage Role Templates task in APM.

Manage Data Security Policies

Data security grants provisioned to roles are data security policies. The security reference implementation provides a comprehensive set of predefined data security policies and predetermined data security policies based on data role templates.

Data security policies are available for review in Authorization Policy Manager (APM). Data security policies are implemented by grants stored in Oracle Fusion Data Security (FND_GRANTS).

Data security policies secure the database resources of an enterprise. Database resources are predefined applications data objects and should not be changed. However, for cases where custom database resources must be secured objects, the IT security manager is entitled to manage database resources and create new data security policies.

Warning

Review but do not modify HCM data security policies in APM except as a custom implementation. Use the HCM Manage Data Role And Security Profiles task to generate the necessary data security policies and data roles.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Application Role Management Duty role, which is entitled to manage data security policies (the entitlement is Manage Data Security Policy). This entitlement provides the access necessary to perform the Manage Data Security Policies task in APM.

Manage Encryption Keys

Create or edit encryption keys held in Oracle Wallet to secure Personally Identifiable Information (PII) attributes This task is only available when Payments is implemented.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Payments Data Security Administration Duty role, which is entitled to manage encryption keys that secure PII (the entitlement is Manage Wallet). This entitlement provides the access necessary to perform the Manage Encryptions Keys task in Payments.

Defining Trading Partner Security After Enterprise Setup: Points to Consider

Trading partner access can be secured with user roles and user role usages for suppliers.

Trading Partner Security tasks within the Information Technology (IT) Management business process are:

Manage Supplier User Roles

This task manages roles that the supplier administrator can provision to supplier users, and is only available when the Supplier Portal or Sourcing are implemented.

In the security reference implementation, the IT Security Manager job role hierarchy includes the User Management Duty role, which is entitled to create and manage users (the entitlement is Manage User Principal). This entitlement provides the access necessary to perform the Create Implementation Users task in OIM.

In the security reference implementation the IT Security Manager job role hierarchy includes the Supplier User Role Management Duty role, which is entitled to manage supplier user roles (the entitlement is Manage Supplier User Roles). This entitlement provides the access necessary to perform the Manage Supplier User Roles task in the Supplier Portal or Sourcing.

Manage Supplier User Role Usages

This task manages the set of roles and default roles that supplier users can provision based on the roles that are defined by the Manage Supplier User Roles task.

This task is only available when the Supplier Portal or Sourcing are implemented.

In the security reference implementation, the IT Security Manager job role hierarchy includes the Supplier Portal Configuration Management Duty role, which is entitled to manage supplier user roles (the entitlement is Manage Supplier User Role Usages). This entitlement provides the access necessary to perform the Manage Supplier User Roles Usages task in the Supplier Portal or Sourcing.

Security Tasks After Enterprise Changes: Points To Consider

Various changes to your enterprise require security adjustments.

Note

Oracle Fusion Applications security does not require security adjustments after HCM changes, such as when a person changes to another job, because their provisioned roles are automatically revoked and recalculated based on role provisioning rules.

New Enterprise Roles

You may be adding new abstract or job roles or both, and the data role templates in your deployment may be generating new data roles as you set up new dimensions.

As a security guideline, adjust your role provisioning rules so these new roles are appropriately provisioned.

Tip

Review data role templates to identify newly generated data roles after enterprise setup changes. For example, the Financials Common Module Template for Business Unit generates new data roles after you create a new business unit. These data roles need to be provisioned.

Reorganization

You may create a new business unit or combine existing business units.

Securing the change may require security tasks including the following.

Top Security Tasks

The top security administration tasks for IT security managers and security administrators are the ones required or most likely necessary in setting up and implementing Oracle Fusion Applications security.

Top security tasks include the following.

Top Security Setup Tasks

The top security setup tasks are as follows.


Security task

Importance to managing risk

Frequency

Notes

1. Import Worker Users

Low

Depends on need

 

2. Create Implementation Users

Low

Required

 

3. Provision Roles to Implementation Users

High

Required

Roles such as Implementation Consultant provide the necessary access.

Top Defining Security or Implementation Tasks

After reviewing the security reference implementation, as presented in the Security Reference Manual for each offering, the top defining security or implementation tasks are as follows.


Security task

Importance to managing risk

Frequency

Notes

4. Implement predefined data security policies by generating data roles (if appropriate) and HCM security profiles.

High

Depends on need

To understand what data roles are available, review the predefined data role templates and HCM security profiles. Once data roles are generated based on your implementation of data role templates and HCM security profiles, modify or define role

5. Manage Data Security Policies when customizing, such as when adding a database resource (table)

High

Initially or when new database resources needs to be secured

To understand the data security provided by the Oracle Fusion Applications security reference implementation, it is important to review the predefined data security policies.

6. Manage Duties

High

Initially or when new jobs are defined

To understand the Oracle Fusion Applications security reference implementation and the job roles available for provisioning to users, it is important to understand the duty roles inherited by those job roles. As a security guideline, duty roles should not be changed, only their participation in role hierarchies.

Top Security Administration Tasks

The top security administration tasks are as follows.


Security Task

Importance to managing risk

Frequency

Notes

7. Approve User and Role Provisioning Requests

High

Infrequent

Provisioning requests are pre-approved in HCM. This task can be set up to be manual. Approvals are required when provisioning a role in HCM causes a segregation of duties (SOD) violation.

8. Assign User Roles

Low

Never - this task is in Workforce Deployment and performed by HCM roles or when provisioning supplier users in Supplier Portal

The Oracle Fusion Applications security reference implementation provides abstract, job, and data roles available for provisioning to user. Without provisioned roles, users are not authorized to access the portions of Oracle Fusion applications necessary to perform their duties.

9. View SOD policy conflicts and violations

High

Infrequent

Significant where reference security implementation changes

FAQs for Security Tasks

How can I view the duties included in a job role?

Use the Manage Duties task to view the duties inherited by a role. To perform this task, you'll use the integrated Authorization Policy Manager.

Each logical partition or pillar contains a collection of application roles representing duties, and function and data security policies carried by those roles.

How do I view the entitlement or policies carried by a job role?

Use the Manage Duties task to view the entitlement carried by the duty roles in a role hierarchy, or policies carried by enterprise roles. To perform this task, you'll use the integrated Authorization Policy Manager.

The Lightweight Directory Access Protocol (LDAP) policy store stores application roles representing duties, and the identity store stores enterprise roles.

How do I change which roles are in a role hierarchy?

Use the Manage Job Roles task to create a hierarchy of enterprise roles. To perform this task, you'll use the integrated Oracle Identity Management UI pages.

Use the Manage Duties task to create a hierarchy of duty roles. To perform this task, you'll use the integrated Authorization Policy Manager.

The Lightweight Directory Access Protocol (LDAP) stores the role hierarchy and the spanning of roles across multiple pillars or logical partitions. The policy store stores duty roles. The identity store stores enterprise roles.

How do I create a hierarchy of roles?

Use the Manage Job Roles task to create a hierarchy of enterprise roles. Use the integrated Oracle Identity Management UI pages to perform this task

User the Manage Duties task to create a hierarchy of applications roles. Use the integrated Authorization Policy Manager to perform this task.

Why would I need to remove duty roles from a role hierarchy?

Some duty roles may enable actions and their associated users interface features that your enterprise does not want users to perform in Oracle Fusion applications.

How do I create a new job role?

Use the following tasks to view the job, abstract, and data roles provisioned to a user.

Use the integrated Oracle Identity Management UI pages to perform these tasks. The Lightweight Directory Access Protocol (LDAP) identity store stores enterprise roles.

Can I create a new duty role?

Yes, but this should only be necessary if you have extended your Oracle Fusion Applications with new duties involving custom objects or functions that must be secured.

Use the Manage Duties task to create a duty role. To perform this task, you'll use the integrated Authorization Policy Manager.

How can I view the segregation of duties policies respected by a role?

Use the Manage Segregation of Duties Policies task to view segregation of duties policies. Use the integrated Application Access Controls Governor (AACG) in Governance, Risk, and Compliance Controls (GRCC) to perform this task.

The Oracle Fusion Applications security reference manual (SRM) for each offering documents the segregation of duties (SOD) policies respected within each job role.

How can I view segregation of duties policy violations?

Use the Manage Application Access Controls task to view segregation of duties policy violations carried by the duty roles inherited by a job role. Use the integrated Application Access Controls Governor (AACG) in Governance, Risk, and Compliance Controls (GRCC) to perform this task.

The Oracle Fusion Applications security reference manual (SRM) for each offering documents the segregation of duties (SOD) policies respected within each job role.

How can I view or change the data security policies carried by job, abstract, and data roles?

Use the Manage Data Security Policies task to view or change data security policies. To perform this task, you'll use the integrated Authorization Policy Manager or data security pages provided by Oracle Fusion Middleware Extensions for Applications (Applications Core).

Oracle Fusion Data Security stores data security policies in the policy store.

How do I create a new data role?

Use the Manage Role Templates task to define which data roles are generated. To perform this task, you'll use the integrated Authorization Policy Manager.

Use the Manage Data Roles and Security Profiles task to define which HCM data roles are generated. To perform this task, you'll use Oracle Fusion Human Capitol Management (HCM).

These tasks may trigger the need for revised role provisioning rules to ensure that new data roles are appropriately provisioned to users.

How can I create a new data security policy?

Use the Manage Data Security Policies task to create new data security policies. Data security policies can also be created by generating data roles based on data role templates or HCM security profiles. To perform this task, you'll use the integrated Authorization Policy Manager or data security pages provided by Oracle Fusion Middleware Extensions for Applications (Applications Core).

Oracle Fusion Data Security stores data security policies in the policy store.

How can I view, create, or change a data role template?

Use the Manage Role Templates task to view, create, or change data role templates. Use the integrated Authorization Policy Manager to perform the Manage Role Templates task.

How can I secure a common object such as an attachment category or a profile option?

Use the Manage Data Security Policies task to secure objects. To perform this task, you'll use the integrated Authorization Policy Manager or data security pages provided by Oracle Fusion Middleware Extensions for Applications (Applications Core).

How do I view, create, or update encryption keys used to secure attributes of personally identifiable information?

Use the Manage Encryption Keys task, which is available in Oracle Fusion Payments.

How do I view, create, or update data access sets used to secure ledgers and ledger sets?

Use the Manage Data Access Sets task, which is available in Oracle Fusion General Ledger.

How do I view, create, or update accounting flexfield segment security rules?

Use the Manage Security Segments task, which is available in Oracle Fusion General Ledger.

Why can't a user access a task?

If a user believes a necessary task is missing from their list of tasks, they may need to be provisioned with different or additional roles.

Access is provisioned to users based on their position or job, which consists of the duties performed in that job. Provisioned enterprise roles provide access by means of inherited duty roles.

The duty roles in a role hierarchy carry entitlement to access functions and data. Duty roles are not provisioned directly to users but granted to enterprise roles in a role hierarchy. As a security guideline, refrain from changing the privileges of the duty role's entitlement. If more or less entitlement is required by an enterprise role, change the role hierarchy that defines the enterprise role instead.

Users are generally provisioned with roles based on role provisioning rules. If a user requests being provisioned with a role to access a task, use the security considerations of your enterprise and the roles available in your security reference implementation to determine which roles are appropriate.

How can I tell which roles are provisioned to a user?

Use the following tasks to view the job, abstract, and data roles provisioned to a user.

Use Human Capital Management and integrated Oracle Identity Management UI pages to perform these tasks. Users, roles, and provisioning information are stored in Lightweight Directory Access Protocol (LDAP) stores.

How can I create a new user?

Use the Manage Users task to create new users. Use Human Capital Management (HCM) pages to perform this task.

When you create a new worker, HCM creates a new user and identity.

The Hire Employee and Add Contingent Worker tasks also result in new user creation requests.

Creating a new user automatically triggers role provisioning requests based on role provisioning rules.

Note

If you are creating new implementation users for setting up your enterprise, use the Create Implementation Users task. Use the integrated Oracle Identity Management UI pages to perform this task.

How do I provision roles to users?

Use the following tasks to provision roles to users.

The Manage Users task is available in Oracle Fusion Human Capital Management (HCM), Oracle Fusion Customer Relationship Management (CRM) and Oracle Fusion Suppliers.

Implementation users are provisioned through Oracle Identity Management (OIM) when HCM is not setup at the start of the implementation. The Provision Roles to Implementation Users is not needed once implementation is complete. Once HCM is setup, HCM is used to provision roles to non-implementation users by performing the Manage Users task. Human Resources (HR) transaction flows such as Hire and Promote also provision roles.

How do I view an audit log?

Use Oracle Enterprise Manager to view audit logs. Viewing audit logs is an Oracle Fusion Middleware function and not represented by an Oracle Fusion Applications business process model (BPM) task.