Browser version scriptSkip Headers

Oracle® Fusion Applications Procurement Implementation Guide
11g Release 1 (11.1.2)
Part Number E20383-02
Go to contents  page
Contents
Go to Previous  page
Previous
Go to previous page
Next

14 Common Setup: Other Common Setup and Maintenance Tasks

This chapter contains the following:

Define Transactional Business Intelligence Configuration

Define Extensions: Define Custom Enterprise Scheduler Jobs

Customization and Sandboxes

Define Transactional Business Intelligence Configuration

Define Transactional Business Intelligence Configuration: Highlights

Configure Oracle Transactional Business Intelligence for ad hoc reporting, review certain setup objects to be used in Transactional Business Intelligence, and manage the presentation catalog and currency type display.

Defining Transactional Business Intelligence Configuration

Access to Person Data

Assigning Security Profiles to Job Roles for Oracle Fusion Transactional Business Intelligence Users: Explained

Users of Oracle Fusion Transactional Business Intelligence (Transactional Business Intelligence) need access to some person data for reporting purposes. To provide this access, you assign a predefined security profile to relevant job or abstract roles using the Oracle Fusion Human Capital Management (HCM) setup task Manage Data Role and Security Profiles. On completion of this task, Oracle Fusion Data Security is updated automatically for roles being used to access Transactional Business Intelligence.

Job or Abstract Roles and Related Security Profiles

The following table identifies, by Oracle Fusion product, the job and abstract roles that need access to person data and the predefined security profile that you assign to each role.


Product

Job or Abstract Role

Security Profile

Oracle Fusion Assets

Asset Accountant

View All Workers

Oracle Fusion Assets

Asset Accounting Manager

View All Workers

Oracle Fusion Enterprise Planning and Budgeting

Budget Analyst

View All Workers

Oracle Fusion Enterprise Planning and Budgeting

Budget Manager

View All Workers

Oracle Fusion Financial Consolidation Hub

Consolidation Accountant

View All Workers

Oracle Fusion Financial Consolidation Hub

Consolidation Manager

View All Workers

Oracle Fusion Financials Common Module

Intercompany Accountant

View All Workers

Oracle Fusion General Ledger

Financial Analyst

View All Workers

Oracle Fusion General Ledger

General Accountant

View All Workers

Oracle Fusion General Ledger

General Accounting Manager

View All Workers

Oracle Fusion Incentive Compensation

Incentive Compensation Participant Manager

View Manager Hierarchy

Oracle Fusion Inventory Management

Warehouse Manager

View All Workers

Oracle Fusion Project Foundation

Project Accountant

View All Workers

Oracle Fusion Project Foundation

Project Administrator

View All Workers

Oracle Fusion Project Foundation

Project Billing Specialist

View All Workers

Oracle Fusion Purchasing

Buyer

View All Workers

Oracle Fusion Sourcing

Category Manager

View All Workers

Oracle Fusion Sourcing

Sourcing Project Collaborator

View All Workers

For example, as part of their Transactional Business Intelligence setup:

The security profiles that HCM roles need to access Transactional Business Intelligence are assigned during the setup of HCM data security: no additional setup is required for Transactional Business Intelligence purposes.

Enabling an Oracle Fusion Transactional Business Intelligence User to Access Person Data: Worked Example

This example shows how to assign a security profile to a job or abstract role to enable users with that role to access person data. This task is required for users of Oracle Fusion Transactional Business Intelligence (Transactional Business Intelligence) who do not also use Oracle Fusion Human Capital Management (HCM).

The following table summarizes key decisions for this scenario. When performing this task, use the job or abstract role for your product and the name of the relevant predefined person security profile in place of those shown here.


Decisions to Consider

In This Example

What is the name of the Transactional Business Intelligence job or abstract role?

Warehouse Manager

What is the name of the person security profile?

View All Workers

Summary of the Tasks

To perform these tasks, you must have the role IT Security Manager.

  1. Launch the task Manage Data Role and Security Profiles.

  2. Search for the job or abstract role.

  3. Assign the relevant predefined security profile to the job or abstract role.

Launching the Task Manage Data Role and Security Profiles

  1. Sign in to the Functional Setup Manager (FSM).
  2. In the FSM, click the All Tasks tab.
  3. In the Search region, complete the fields as shown in this table:

    Field

    Value

    Search

    Tasks

    Name

    Manage Data Role and Security Profiles


  4. Click Search.
  5. In the search results, click Go to Task for the Manage Data Role and Security Profiles task.

Searching for the Job or Abstract Role

  1. On the Manage HCM Data Roles page, enter the job name Warehouse Manager in the Role field.
  2. Click Search.
  3. In the search results, highlight the entry for the Warehouse Manager job role.
  4. Click Assign.

Assigning the Security Profile to the Job Role

  1. In the Person Security Profile field on the Assign Data Role: Security Criteria page, select the security profile View All Workers.
  2. Click Review.
  3. On the Assign Data Role: Review page, click Submit.

Define Extensions: Define Custom Enterprise Scheduler Jobs

Managing Job Definitions: Highlights

Oracle Enterprise Scheduler jobs are run in Oracle Fusion Applications to process data and, in some cases, to provide report output. A job definition contains the metadata that determines what the job does and what options are available to users who run the job. You can create and maintain job definitions for use in Oracle Fusion Applications.

Managing job definitions is fully described in the Oracle Fusion Applications Administrator's Guide. As you read content from that guide, note that the guide describes managing Oracle Enterprise Scheduler, including job definitions, from Oracle Enterprise Manager Fusion Applications Control. You can also access job definitions by starting in the Setup and Maintenance Overview page and searching for the Enterprise Scheduler job tasks for your applications.

Viewing and Creating Job Definitions

Managing List of Values Sources: Highlights

A list of values source for Oracle Enterprise Scheduler job definitions determines where a list of values comes from and what the specific values are. These lists of values are used in parameters and user properties of job definitions. For example, you can use a source of country values for a Country job parameter.

Managing list of values sources is fully described in the Oracle Fusion Applications Administrator's Guide. As you read content from that guide, note that the guide describes managing Oracle Enterprise Scheduler, including list of values sources, from Oracle Enterprise Manager Fusion Applications Control. You can also access list of values sources by starting in the Setup and Maintenance Overview page and searching for Enterprise Scheduler job tasks.

Registering and Searching for List of Values Sources

Customization and Sandboxes

Customizing Pages Using Oracle Composer: Highlights

You can customize dashboards and some work areas, where available, for all or some users based on a selected customization layer, for example only for users in a specific country or with a specific job role. When you select to customize a page from the Administration menu in the global area, you invoke Oracle Composer, which enables the customization. The Administration menu is only available if you have appropriate roles.

From the same menu, you can also access the Customization Manager, which displays a list of components in the current page and details about the layers in which each component is customized. You can also access sandboxes from the Administration menu, to make customizations to a runtime use session before deploying your changes to the mainline.

Customizing pages using Oracle Composer, the Customization Manager, and sandboxes are described in the Oracle Fusion Applications Extensibility Guide.

Editing Pages

Customization Manager

Sandboxes

Sandboxes: Highlights

Use a sandbox to commit customizations to a runtime use session for validation before deploying changes to the mainline. Administrators create and manage sandboxes. An active sandbox isolates changes from the mainline and other users.

Sandboxes can contain the following types of customization changes.

Metadata changes are captured in a metadata sandbox. Data security changes are additionally captured in a data security enabled sandbox. Changes to a flexfield are captured in a flexfield that is deployed as a single flexfield sandbox. Once you are ready to make sandbox changes available in the mainline, you either publish the metadata or data security sandbox, or deploy the flexfield. Only metadata and data security sandboxes can be downloaded as a sandbox file for import to another Oracle Fusion Applications instance.

The following table lists the differences among the types of sandboxes.


Type of Changes

Type of Sandbox

Method for Making Changes Available in Mainline

Downloadable?

Metadata

Sandbox

Publish sandbox

Yes

Data security

Sandbox enabled for data security changes

Publish sandbox

Yes

Flexfield

Flexfield deployed as a flexfield-enabled sandbox

Deploy flexfield

No

Only one sandbox can be active at a time. Changes made while a sandbox is active are captured in that sandbox.

For more information on using the Sandbox Manager, and customizing and securing pages, business objects, data, and custom objects in a sandbox, see the Oracle Fusion Applications Extensibility Guide.

Managing a Page Customization Sandbox

You can make metadata (MDS) type changes in a sandbox, including menu customizations, changes to the personalization menu, implicit ADF customizations, or changes made with Oracle Composer or CRM Application Composer.

Managing a Data Security Sandbox

You can create a sandbox for data security testing, or designate an existing sandbox to become enabled for data security testing.

Managing a Flexfield Sandbox

You create a flexfield-enabled sandbox by deploying one flexfield to a sandbox using the Manage Flexfield task flow. The flexfield sandbox gets its name from the flexfield you deploy. You cannot test two flexfields in the same sandbox. Once you deploy a flexfield as a sandbox, you must sign out and back in to view how the sandbox runtime reflects the flexfield changes, such as new segments. You can redeploy the same flexfield to the same sandbox repeatedly as you make incremental changes to the flexfield setup.