1Introduction to Oracle Sales Cloud Security

This chapter contains the following:

Securing Oracle Sales Cloud: Overview

Oracle Sales Cloud is secure as delivered. This guide describes how to enable user access to Oracle Sales Cloud functions and data. Some of the tasks described in this guide are performed only or mainly during implementation of Oracle Sales Cloud. Most, however, can be performed at any time and as new requirements emerge. This topic summarizes the scope of this guide and identifies the contents of each chapter.

Guide Structure

This table describes the contents of each chapter in the guide.

Chapter Contents

Authentication and Identity Management

Introduces authentication and identity management in Oracle Sales Cloud

Authorization with Role-Based Access Control

A brief overview of how role-based access control (RBAC) is implemented in Oracle Sales Cloud.

Data Sharing Mechanisms and Visibility

How users gain visibility to object data.

About Oracle Sales Cloud Users

Getting Ready to Create Application Users

Creating Application Users

Managing Application Users

How to create and manage Sales Cloud setup users and application users, and how to provision users with roles to provide them with access to Sales Cloud functions and data.

Using the Security Console

Introduces the tools used to manage the roles, privileges, and policies of the RBAC model.

How to set up, manage, and use the Security Console.

Reviewing Roles and Role Assignments

How to review roles and identify the users who have them on the Security Console.

Certificate Management

How to generate, import, export, and delete PGP and X.509 certificates on the Security Console.

Customizing Security

How to configure Sales Cloud security policies, how to copy predefined roles to create new roles, and how to create new roles from scratch.

Synchronizing with Oracle Identity Management

The role of the LDAP daily processes and how to schedule them.

Security and Reporting

How to enable users to run Oracle Transactional Business Intelligence and Business Intelligence Publisher reports.

Implementing Federated Single Sign-On

How to implement federated Single Sign-On.

Advanced Data Security

An introduction to these optional cloud services:

  • Database Vault

  • Transparent Data Encryption

During implementation, you can perform security-related tasks:

  • From a functional area task list

  • By selecting Setup and Maintenance on the home page and searching for the task on the All Tasks tab of the Setup and Maintenance work area

Once the implementation is complete, you can perform most security-related tasks from the Setup and Maintenance work area or the Security Console.