Contents
1 Introduction
- Securing Oracle ERP Cloud: Overview
- Overview of ERP Security Implementation
- Options for Viewing a Visualization Graph
- Role Types
- Role Inheritance
- Security Visualizations
- Duty Role Components
- Aggregate Privileges
- Guidelines for Configuring Security in Oracle Applications Cloud
2 Security Console
- Overview of Security Console
- Configure the Security Console
- Retrieve Latest LDAP Changes
- Visualization Table Display Options
- Generate a Visualization
- Simulate Navigator Menus in the Security Console
- Analytics for Data Resources
- FAQs on Using the Security Console
3 Setting Up Application Security
- Overview of Applications Security Setup Tasks
- User-Name Formats
- Password Policy
- Role Preferences
- User Categories
- Add Users to a User Category
- User-Name and Password Notifications
- How can I enable notifications for pending workers?
- Why don't I see my user name in the forgot password email notification?
- Why don't I see my user name in the forgot user name email notification?
- Create a Notification Template
- Schedule the Import User and Role Application Security Data Process
- Schedule the Import User Login History Process
- Why You Should Run the Send Pending LDAP Requests Process
- Schedule the Send Pending LDAP Requests Process
- Retrieve Latest LDAP Changes
4 Bridge for Microsoft Active Directory
- Overview of Bridge for Microsoft Active Directory
- Active Directory Synchronization
- User Account Attribute Mapping
- Microsoft Active Directory Bridge Setup
- FAQs on Working with the Bridge for Microsoft Active Directory
5 Understanding ERP Self Service Roles
- Before You Start
- HCM Abstract Roles
- ERP Self-Service Roles
- Enterprise Resource Planning Self Service User
- Enterprise Resource Planning Approval Duty
- Self Service Reporting Duties
- FAQs for ERP Self Service Roles
6 Enabling Basic Access to HCM Data
- Before You Start
- Why You Assign Security Profiles to Roles
- Assign Security Profiles to Roles
- Configure Employee List of Values
7 Implementation Users
- Implementation Users
- Overview of ERP Implementation Users
- User Accounts
- User Account Details
- Create User Accounts for Implementation Users
- Assign Roles to Implementation Users
- Delete Implementation User Accounts
- Synchronize User and Role Information
- Reset the Cloud Service Administrator Sign-In Details
8 Preparing for Application Users
- Before You Start
- Preparing for Application Users
- User and Role-Provisioning Setup Options
- User Account Creation Option
- User Account Role Provisioning Option
- User Account Maintenance Option
- User Account Creation for Terminated Workers Option
- Set the User and Role Provisioning Options
- Provision Self Service Roles to Users Automatically
- FAQs for Preparing for Application Users
9 Application Users Management
- Before You Start
- Users
- Users Accounts
- FAQs on Creating and Managing Application Users
- Why did some roles appear automatically?
- What happens when I autoprovision roles for a user?
- Why is the user losing roles automatically?
- Why can't I see the roles that I want to assign to a user?
- What happens if I deprovision a role from a user?
- What happens if I edit a user name?
- What happens if I send the user name and password?
- What happens if I reset a user's password?
- How can I notify users of their user names and passwords?
10 Role Provisioning
- Role Mappings
- Create a Role Mapping
- Role Provisioning and Deprovisioning
- Autoprovisioning
- Roles That Give Workflow Administrators Access
- FAQs on Provisioning Roles and Data to Application Users
11 Data Assignments
- Data Access
- Assign Data Access to Users
- Automatic Data Provisioning
- Creating a Data Provisioning Rule
- Automatic Data Provisioning and Deprovisioning
- Configure Advanced Implicit Data Security for Non-Discretionary Access
- FAQs on Assigning Data Access to Application Users
12 Reporting on Application Users and Roles
- Run the User Details System Extract Report
- User Details System Extract Report Parameters
- User Details System Extract Report
- Person User Information Reports
- User History Report
- View Role Information Using Security Dashboard
- LDAP Request Information Reports
- Inactive Users Report
- User and Role Access Audit Report
- User Role Membership Report
- User and Role Access Audit Report
- User Password Changes Audit Report
- View Locked Users and Unlock Users
- FAQs for Reporting on Application Users and Roles
13 Location Based Access
- Overview of Location-Based Access
- How Location-Based Access Works
- Enable and Disable Location-Based Access
- FAQs on Location Based Access
- What is allowlisting?
- Why can't I see the Location Based Access tab on the Administration page?
- How can I make a role public?
- How can I ensure that I always have access to the Security Console?
- How can I disable Location-based Access when I am not signed in to the application?
- How can I disable Location-based Access when I am locked out of the application?
14 Single Sign-On
- Configure Single Sign-On
- Oracle Applications Cloud as the Single Sign-On (SSO) Service Provider
- FAQs on Single Sign-On
- Does the service provider store user passwords?
- Can I set up an identity provider without enabling it?
- How can I allow my users to sign in using their company's credentials?
- What should I do to extend the validity of certificates provided by the identity provider?
- How can the identity provider obtain renewed certificates from the service provider?
- How can I disable Single Sign-On when I am not signed in to the application?
- What are the different events and notifications associated with the Single Sign-On functionality?
- How do I reimport Identity Provider metadata?
- How can I disable Single Sign-On when I am locked out of the application?
15 API Authentication
- Configure Outbound API Authentication Using JWT Custom Claims
- Configure Outbound API Authentication Using Three Legged OAuth Authorization Protocol
- Configure Inbound Authentication
- Is there a recommended format for the public certificate?
16 Export and Import of Security Setup Data
- Export and Import of Security Console Data
- Export and Import of Custom Roles
- Export and Import a Custom Role
- Export and Import of ERP Security Setups
17 Security Configuration
- Data Security Policies
- FAQs on Configuring Security
18 Roles and Role Assignments
19 Role Configuration Using the Security Console
- Custom Roles
20 Certificates and Keys
- Overview of Certificates
- Types of Certificates
- Sign a X.509 Certificate
- Import and Export X.509 Certificates
- Import and Export PGP Certificates
- Delete Certificates
21 Security in Oracle Financials
- Security for Country-Specific Features
- General Ledger
- Overview of General Ledger Security
- Overview of Data Access Set Security
- Examples of Data Access Set Security
- Segment Value Security
- Manage Segment Value Security Rules Spreadsheet
- Example of Segment Value Security
- Enable Security on a Chart of Accounts
- Data Security Differences in GL Features Based on Balance Cubes
- How You Segregate Import Journals Access from FBDI Import for Journals Access
- FAQs for General Ledger
- What happens when changes are made to an account hierarchy that's referenced in segment value security rules?
- When does security take effect on chart of accounts value sets for balances cubes?
- How can I secure the data in GL balances cubes?
- What's the difference between the segment value security rule spreadsheets?
- Payables
- Subledger Accounting
- Cash Management
- Assets
- Payments
- Business Intelligence
- Overview of Financial Reporting Security
- Oracle Fusion Transactional Business Intelligence Security
- How Reporting Data Is Secured
- Business Intelligence Roles
- Delivered Roles for Financials Subject Areas
- Reporting Roles and Permissions
- Configure Security for Oracle Transactional Business Intelligence
- Business Intelligence Publisher Secured List Views
22 Security in Oracle Project Management
- Overview of Project Management Security
- Creating Custom Roles for Projects
- Project Execution Management
- Project Financial Management
- Project Management Work Area Security
- Expanded View Project Plan Access for Non-Team Members
- Business Intelligence
23 Security in Oracle Procurement
- Overview of Security for Oracle Fusion Cloud Procurement
- Procurement Requester
- Procurement Agent
- Supplier User
- Supplier Administration
- Business Intelligence