Contents
1 Introduction
- About This Guide
- Role Types
- Role Inheritance
- Duty Role Components
- Aggregate Privileges
- Guidelines for Configuring Security in Oracle Applications Cloud
2 Security Console
- Overview
- Configure the Security Console
- Retrieve Latest LDAP Changes
- Security Visualizations
- Options for Viewing a Visualization Graph
- Visualization Table Display Options
- Generate a Visualization
- Simulate Navigator Menus in the Security Console
- Analytics for Roles
- Analytics for Data Resources
- FAQs for Security Console
3 Implementation Users
- Overview
- User Accounts
- User Account Details
- Add User Accounts
- Compare Users
- Copy Roles from One User to Another
- Guidance for Assigning Predefined Roles
- Assign Roles to an Existing User
- Reset Passwords
- Delete User Accounts
- Get User Sign-in Sign-out Information
- Create Notification Templates
- Synchronize User and Role Information
- Reset the Cloud Service Administrator Sign-In Details
4 User Categories
- Overview of User Categories
- Define Password Policy
- Enable Notifications
- Add Users to a User Category
- Notifications for Users Based on Status
- Configure a Custom Password Policy
- FAQs for User Categories
- How can I direct users to a specific application or website after password reset?
- How can I enable or disable notifications for users?
- How can I enable notifications for pending workers?
- Why don't I see my user name in the forgot password email notification?
- Why don't I see my user name in the forgot user name email notification?
5 Application Users Management
- Overview of Application Users
- User and Role-Provisioning Setup Options
- User Account Creation Option
- User Account Role Provisioning Option
- User Account Maintenance Option
- Set the User and Role Provisioning Options
- Provision Abstract Roles to Users Automatically
- Users
- User Accounts
- Manage HCM User Accounts
- User Names
- Why You Send Personal Data to Identity Store
- How You Manage an Incomplete Request for an HCM User Account
- How User Accounts Are Suspended
- User Details System Extract Report
- User Details System Extract Report Parameters
- User Password Changes Audit Report
- View Locked Users and Unlock Users
- Reset Passwords
- Password Expiry Report
- FAQs for Application Users Management
- Where do default user names come from?
- Why did some roles appear automatically?
- How can I create a user?
- What happens when I autoprovision roles for a user?
- Why is the user losing roles automatically?
- Why can't I see the roles that I want to assign to a user?
- What happens if I deprovision a role from a user?
- What happens if I edit a user name?
- What happens if I send the user name and password?
- What happens if I reset a user's password?
- How can I notify users of their user names and passwords?
6 Data Security Policies
- Data Security
- Advanced Data Security
- How Data Resources and Data Security Policies Work Together
- FAQs for Data Security Policies
7 Role Provisioning, Role Assignments, and Role Configuration
- Role Mappings
- Create a Role Mapping
- Role Provisioning and Deprovisioning
- Autoprovisioning
- User and Role Access Audit Report
- Data Access
- Assign Data Access to Users
- View Role Information Using Security Dashboard
- Review Role Assignments
- Review Role Hierarchies
- Compare Roles
- Create Roles in the Security Console
- Role Copying or Editing
- Security Console Role-Copy Options
- Copy Job Role and Abstract Role
- Edit Job Role and Abstract Role
- Create Job Role and Abstract Role from Scratch
- Copy and Edit Duty Roles
- Assign Roles for Access to Manage Scheduled Processes
- Roles That Give Workflow Administrators Access
- User Role Membership Report
- Create a Custom Role with Limited Access
- FAQs for Role Provisioning, Role Assignments, and Role Configuration
- What's a role-mapping condition?
- What's an associated role in a role mapping?
- What's the provisioning method?
- How do I provision roles to users?
- How do I view the privileges or policies for a job role?
- How can I tell which roles are provisioned to a user?
- Why can't a user access a task?
- How can I design roles?
- How do I create a role hierarchy?
- Why would I need to remove duty roles from a role hierarchy?
- How do I create a new job role?
8 Location-Based Access
- Overview of Location-Based Access
- How Location-Based Access Works
- Enable and Disable Location-Based Access
- FAQs for Location-Based Access
- What is allowlisting?
- Why can't I see the Location Based Access tab on the Administration page?
- How can I make a role public?
- How can I ensure that I always have access to the Security Console?
- How can I disable Location-based Access when I am not signed in to the application?
- How can I disable Location-based Access when I am locked out of the application?
- How many IP Addresses can I enter in the IP Address Allowlist text box?
9 Single Sign-On
- Oracle Applications Cloud as the Single Sign-On (SSO) Service Provider
- Configure Single Sign-On
- FAQs for Single Sign-On
- Does the service provider store user passwords?
- Can I set up an identity provider without enabling it?
- How can I allow my users to sign in using their company's credentials?
- What should I do to extend the validity of certificates provided by the identity provider?
- How can the identity provider obtain renewed certificates from the service provider?
- How can I disable Single Sign-On when I am not signed in to the application?
- How can I disable Single Sign-On when I am locked out of the application?
- What are the different events and notifications associated with the Single Sign-On functionality?
- How do I reimport Identity Provider metadata?
- Why does the company login page not appear even after enabling identity provider?
- Is an identity provider using the SHA1 signing algorithm supported for federation?
- How to access SSO Federation logs for identity providers?
10 API Authentication
- Configure Outbound API Authentication Using JWT Custom Claims
- Configure Outbound API Authentication Using Three Legged OAuth Authorization Protocol
- Configure Inbound Authentication
- Is there a recommended format for the public certificate?
11 Export and Import of Security Setup Data
- Export and Import of Security Console Data
- Export and Import of HCM Custom Roles and Security Profiles