Securing Oracle ERP Cloud: Overview

Oracle ERP Cloud is secure as delivered. This guide explains how to enable user access to ERP functions and data. You perform some of the tasks in this guide either only or mainly during implementation. Most, however, can also be performed later and as

To manage roles, use the Security Console and other tasks available in the Setup and Maintenance work area. You may use either of these options to create or edit roles, or to view and work with them later; the choice is a matter of your preference. Some chapters in this guide discuss the use of Setup and Maintenance tasks, and later chapters discuss the use of the Security Console.

Note: Any references to data roles in this guide are only applicable to Oracle HCM Cloud. Data roles are no longer used in Oracle ERP Cloud.

Guide Structure

This table describes the content of each chapter in this guide.

Chapter

Content

Introduction

A brief overview of role-based security concepts

Using the Security Console

How to set up and manage the Security Console, and use it to view role hierarchies and Navigator menus

Managing Implementation Users

The purpose of implementation users and how you create them

Preparing for Application Users

Enterprise-wide options and related decisions that affect application users

Creating and Managing Application Users

The different ways you can create application users and maintain user accounts, with instructions for some methods

Provisioning Roles to Application Users

How to use tasks available from Setup and Maintenance to enable application users to acquire roles, with instructions for creating some standard role mappings

Configuring Security

How to create, review, and modify security components, with recommended best practices

Reviewing Roles and Role Assignments

How to use the Security Console to review roles and identify the users assigned to them

Configuring Roles in the Security Console

How to create, review, and modify roles in the Security Console, with recommended best practices

Managing Certificates and Keys

How to use the Security Console to generate, import, export, and delete digital certificates

Implementing Security in Oracle Fusion Financials

The additional security setup and configuration tasks associated with Oracle Fusion Financials

Implementing Security in Oracle Fusion Project Portfolio Management

The additional security setup and configuration tasks associated with Oracle Fusion Project Portfolio Management

Implementing Security in Oracle Fusion Procurement

The additional security setup and configuration tasks associated with Oracle Fusion Procurement

During implementation, you can perform security-related tasks from the Security Console if you have the IT Security Manager role. To use the Security Console, navigate to: Tools > Security Console.

For information on securing reports and analytics, see the Securing Analytics Publisher Reports and Related Components in the Oracle Cloud Administering Transactional Analyses guide.