Setting Up Security

This chapter covers the following topics:

Overview of Security Topic Organization

This group of topics explains how you can restrict user access to service request and case data.

The rest of the topics provide detailed procedures:

About Service Request and Case Security

Oracle TeleService supports both function and data security provided with all applications. See Oracle E-Business Suite Security Guide for details.

In addition, your application provides standard service security, data security built on top of the standard application security. This makes it possible for you to restrict by responsibility the ability of users to view and update service requests and related objects by service request (case) type.

Note: The security features for service requests and cases are identical. If you are implementing Case Management, then read case for every mention of service request in this guide and in the user interface used for setup.

To enable standard service security, you must map responsibilities to service request types and turn the standard security on according to the procedures in this chapter.

Note: If you are running multiple service applications in the same database instance, then you must map responsibilities to service request types and turn standard security on to keep users from one application accessing service requests of the other.

For example, an implementation running both Customer Support (to support customers) and Service Desk (to support employees) must create separate service request types and mappings for each application to prevent agents helping employees from viewing service requests logged for customers.

Note: Standard service security relies on the global application context that is set by the application framework on login. If you are using the Service Request public APIs to create and update service requests in an asynchronous manner, then the original application context may be lost. For this reason, you must set the global application context (user_id, resp_id, and resp_appl_id) to the original application context values to ensure that the user had appropriate access to the service request data.

Features of Standard Service Request Security

Standard service request security:

Standard security secures service request data not just in Oracle TeleService, but in all applications that use service requests. (See How Turning on Standard Service Security Impacts Other Applications.)

Turning service security on or off does not affect objects such as tasks and notes that are not attached to service requests.

Read-Only and Other Access Types

Standard service security provides either no access or create/update access. It does not distinguish between read-only access and update access.

To provide users with read-only access, you must implement custom data security.

The HTML-based Oracle TeleService modules provide a read-only page for agents with read-only permissions.

The Forms-based Oracle TeleService module and Oracle Depot Repair, however, displays the service request in the edit mode. Users who are restricted to read-only access get no indication that updates are disallowed until they attempt to save their changes and the application displays an error message.

Effect of Turning on Standard Service Security on Other Applications

Turning on standard service security affects all applications and Oracle application foundation modules that use service requests to different degrees:

Configuring Data Security for Service Request Attachments

You can control the visibility of service request attachments through the Role-Based Access Control (RBAC) feature of the Oracle E-Business Suite Technology stack.

You can configure role-specific view and edit permissions for service request and case attachments. Use the role-based access setup to allow only service request creators to view and edit service request attachments. You can restrict other agents from accessing the same attachments.

This topic provides information about how to configure data security for service request attachments.

Configuring data security

  1. Create a new document category using the Application Developer responsibility, Document Categories window.

    Navigation: Application Developer > Attachments > Document Categories.

    the picture is described in the document text

    Use SQL Query to note down the NAME of the document category.

    In this example, the document category is Service Request Attachment (USER_NAME) and the NAME is CUSTOM1001647 as show in the screenshot.

    the picture is described in the document text

  2. Create a role and grant using the User Management responsibility.

    1. Navigate to the Roles & Responsibilities page.

    2. In the Search region, select Roles & Responsibilities as the type.

    3. In the Name field, enter the responsibility name: Customer Support Specialist.

    4. Select Service as the application.

    5. Click Go.

      the picture is described in the document text

    6. Click on View in Hierarchy.

    7. Click Create Role, and create a role under "Miscellaneous" category.

    8. Click Save.

    9. Click Create Grant: and create a Grant as follows:

      Enter a name, description, and select Fnd Document Categories as the object.

      the picture is described in the document text

    10. On the Create Grant: Select Object Data Context page, select Instance as the data context.

      the picture is described in the document text

    11. On the Create Grant: Define Object Parameters and Select Set page:

      1. In the Instance Details region, enter the name of the category created in Step 1.

      2. In the Set region, select the set Fnd Attachment Full Access, which is a seeded set used for FND DOCUMENTS object. This set gives full edit access to attachments for roles that have this permission.

        the picture is described in the document text

    12. Click Next, check the details and click Finish.

    13. Now, click Add Note for the Customer Support Specialist responsibility and select the role that you just created.

      the picture is described in the document text

  3. Repeat the same steps for the Case Worker responsibility but ensure that you use the Fnd Attachment Viewer as the set because for the Case Worker responsibility view only capability is to be granted.

    Create the role as follows:

    the picture is described in the document text

    Create the grant as follows:

    the picture is described in the document text

  4. Use Personalization feature to make changes to the Attachments region for the Customer Support Specialist and Case Worker responsibilities.

    Customer Support Specialist Responsibility

    1. Using the Customer Support Specialist responsibility, navigate to the Update Service Request page.

    2. Click Settings and then select Personalize Page.

    3. For the Problem and Diagnosis region, choose SITE as the personalization level.

    4. Click Create Item icon under Entity Map: AttachmentsxRN.CsIncidents

      the picture is described in the document text

    5. Create a categoryMap as follows.

    6. Specify an ID, add the category as the new Category NAME that was create in Step 1

    7. Ensure to specify secured property as true.

      the picture is described in the document text

    8. After completing these steps, any attachment that you add from the Customer Support Specialist responsibility will be editable by the service request owner.

      the picture is described in the document text

Case Worker Responsibility

Similarly, for the Case Worker responsibility, personalize the UpdateCasePG.xml to create an entity map as shown in the screenshot.

the picture is described in the document text

Notice that the attachments on the service request, when viewed from the Case Worker responsibility, the attachments belonging to the newly created category are in View mode and are not editable.

the picture is described in the document text

Setting Up Service Request Data Security Process Overview

Use this high-level procedure to guide your implementation of the service request security.

To use the standard security provided with your application

  1. Under the Service responsibility, navigate to Setup, then Mapping, and select Responsibility Mapping and map each responsibility to the service request types you wish users to access. Unmapped responsibilities cannot view or modify any service requests or related objects. For detailed procedures, see Mapping Responsibilities to Service Request Types.

  2. Navigate to Setup, then Rules, and select Service System Parameters and turn standard security on. For details, see Turning Security On or Off.

To implement custom data security

  1. Create custom security according to procedures described in Oracle E-Business Suite Security Guide - . See Creating Your Own Custom Security for guidelines.

  2. Navigate to Setup, then Rules, and select Service System Parameters and turn the custom security on by selecting Custom Security from the Service Request Security drop-down list. For details, see Turning Security On or Off.

About Mapping Responsibilities

This group of topics explains why and how you map responsibilities to service request types and status groups. It covers:

Uses of Responsibility Mappings

You create mapping between service request types, responsibilities, and status groups for two reasons:

Where You Create and Update Responsibility Mappings

You create and update mappings from the Service Responsibility Setup page. (Navigation: Setup, Mapping, Responsibility Mapping).

the picture is described in the document text

From this page you can:

Notes:

By default, the page displays only active mappings. You can change the view by making an alternate selection from the View list:

Creating a Responsibility Mapping

Use this procedure to map service request types and status groups to responsibilities.

To map a responsibility

  1. Under the Service responsibility, navigate to Setup, then Mapping, then Responsibility Mapping.

    The Service Responsibility Setup page appears.

  2. Click Add Responsibility.

    The Step 1 Add Service Responsibility page appears.

    the picture is described in the document text

  3. Select the responsibility you want to map.

  4. Use the Classification list to specify "Service Provider" if the mapping is intended for Oracle TeleService or other agent-facing service applications. Choose "Self Service User" for Oracle iSupport.

    If you selected "Self Service User", you can only map those service request types that have been set up with the Web Entry check box selected. For details, see Setting Up Service Request Types.

    If you selected "Service Provider", you can specify any service request types, including those specific to Oracle iSupport.

  5. Select the type of mapping you wish to create using the Access list:

    • To grant this responsibility access to all Service Request Types, select All Request Types. If you have selected Self Service User in the last step, then you are mapping the responsibility only to those Service Request Types that are specified for Web entry.

      Note: Granting All Request Types access provides access not only to all existing Service Request Types, but also all of those created in the future.

    • To enable access for this responsibility to a subset of service request types, select Select Service Request Type.

  6. Click Continue.

    Step 2 Map Responsibility to Service Request Types page appears.

  7. If you selected Select Service Request Type, then select one or more types:

    1. Click Add Another Row.

    2. Select a Service Request Type.

  8. To specify a status group for this service request type and responsibility, select it from the Status Group list. For users of this responsibility, the selection you make here overrides the mapping you have made in the Service Request Types page. If you do not make a mapping here, then the application automatically uses the mapping you have entered in Service Request Types page.

  9. Optionally, enter dates in the Start Date and End Date fields if you to restrict the availability of this mapping.

  10. Click Finish to save your entries and return to the Service Responsibility Setup page.

Updating a Responsibility Mapping

Use this procedure to update a responsibility to a service request type and status group mapping.

To update a responsibility mapping

  1. Under the service responsibility, navigate to Setup, then Mapping, and select Responsibility Mapping.

    The Service Responsibility Setup page appears in a browser window.

  2. To change the classification or acess type for this mapping:

    1. Click Update Responsibility.

      The Update Responsibility Setup window appears.Here you can select a different access type and classification.

    2. Click Apply.

      You are returned to the Mapping of Responsibility to Service Request Types page.

  3. Click Update next to the mapping you wish to update.

    The Mapping of Responsibility to Service Request Types page appears.

    On this page you can:

    • Remove a service request type from the mapping, by entering an end date.

    • Specify a service request status group.

    • Map additional types using the Add Another Row button.

Turning Standard Service Security On or Off

Use this procedure to turn on or turn off service request security.

Note: If you turn standard service security on or off while users are accessing the application, then you may have to bounce the Apache server after you have changed the setting.

Prerequisites:

You must map service request types to responsibilities or create your own custom security framework before turning security on as a second step. Turning security on as a first step prevents all users from accessing service requests, tasks, and other related business objects.

To turn security on or off

  1. Navigate to Setup, then Rules, and select Service System Parameters.

    The Service System Parameters page appears.

    Note: Only the Security region relates to security. The second Self Service region, is for restricting customer access to service request types during service request creation in Oracle iSupport. See Enabling Responsibility Mappings for Oracle iSupport.

    the picture is described in the document text

  2. Using the Service Request Security list, select one of the following:

    • No Security: to turn off security and make all service requests and related tasks available to all users.

    • Standard Security: to enable service security supplied with the application.

    • Custom Security: to disable the seeded security and turn on your own custom security.

  3. Click Apply.

Creating Your Own Custom Security

Your organization can create its own custom security framework according to the concepts and procedures described in Oracle E-Business Suite Security Guide.

For example, you may want to:

The custom security you create replaces the standard security provided with your application.

Note: The application expects all grants to obey the following rules:

When you turn service security off, the predefined grants are disabled.

You can use the predefined data as a guide for creating custom security. See Standard Service Security Predefined Data for a list of predefined data.

Enabling Responsibility Mappings for Oracle iSupport

You can restrict customer contacts from creating service requests by service request type. To do so, you create the same responsibility to service request type mappings used in standard service security and then turn on the mappings using the procedure below.

Prerequisites:

You must map Oracle iSupport responsibilities to service request types that have been specified as Web Enabled. (See Mapping Responsibilities to Service Request Types.)

To use mappings to restrict request creation in Oracle iSupport

  1. Under the Service responsibility, navigate to Setup, then Rules, and select Service System Parameters.

    The Service System Parameters page appears.

  2. To restrict Oracle iSupport users from creating service requests of types mapped to their responsibility, select the Only Service Request Types Mapped to User's Responsibility option. This restricts only the creation of service requests; not the ability to access existing requests.

    Note: You can use the mappings for this purpose even when standard security is turned off.

  3. Selecting All Web Enabled Service Request Types permits users to create service request of any type specified as Web Entry enabled. Any mappings you have created are disabled.

  4. Click Apply.