Browser version scriptSkip Headers

Oracle® Fusion Applications Coexistence for HCM Implementation Guide
11g Release 1 (11.1.4)
Part Number E20378-02
Go to contents  page
Contents
Go to Previous  page
Previous
Go to previous page
Next

3 Define Implementation Users

This chapter contains the following:

Implementation Users for HCM Coexistence: Explained

Implementation Users for HCM Coexistence: Explained

The following tasks are relevant to the creation of implementation users who can complete the setup of HCM coexistence:

  1. Create Implementation Users

  2. Create Data Role for Implementation Users

  3. Provision Roles to Implementation Users

To perform these tasks, you must have the IT security manager role. Depending on how you are implementing HCM coexistence, a local security administrator or your service provider (for example, Oracle On Demand) may perform these tasks.

Creating Implementation Users

The implementation user is a user name and password for the person or people who will be performing the setup tasks for the HCM coexistence offering. Implementation users do not need to be associated with HCM person records.

Creating Data Roles for Implementation Users

By default, the application implementation consultant job role has view-all access to all HCM data resources that are relevant to the job role. You do not need to create an HCM data role for the application implementation consultant job role. The application implementation consultant job role is sufficient for the implementation of HCM coexistence.

Provisioning Roles to Implementation Users

Implementation users cannot perform the setup tasks for HCM coexistence until relevant roles are provisioned to them.

You provision the following roles to implementation users:

Important

When the implementation of HCM coexistence is complete, you are strongly recommended to revoke these roles from implementation users. The level of access that they provide to HCM data is generally unnecessary outside the implementation phase and may constitute a security exposure.