IT Security Manager (Job Role)
Protects assets such as information technology systems, data, and networks.
Role Hierarchy
The IT Security Manager job role directly and indirectly inherits these roles.
-
IT Security Manager
-
Functional Setups
-
Manage Users
-
Manage User Account
-
Edit User Name
-
Manage User Roles
-
Use REST Service - Public Workers Read Only
-
-
-
Partner Account Administration
-
Payments Data Security Administration
-
Security Management
-
Separation of Duties Role Analysis
-
-
Security Reporting
-
Separation of Duties Role Analysis
-
-
Security Transaction Analysis
-
Upload data for Access Groups Import
-
Upload data for Assignment Rule Import
-
View Portrait User Account Details Card
-
Duties
This table lists the duties assigned directly and indirectly to the IT Security Manager job role.
Duty Role | Description |
---|---|
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Manage User Account |
Manages user roles. |
Manage Users |
Creates and updates users and assigns roles to users. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Security Transaction Analysis |
Analyzes applications security configurations, including role definitions and security policies. |
Separation of Duties Role Analysis |
Allows user to analyze separation of duty violations on a new or existing role in security. |
Upload data for Access Groups Import |
Allows to upload data file to import Access Groups. |
Upload data for Assignment Rule Import |
Allows to upload data file to import Assignment Rule related data. |
Aggregate Privileges
This table lists aggregate privileges assigned directly and indirectly to the IT Security Manager job role.
Aggregate Privilege | Description |
---|---|
Edit User Name |
Updates the user name associated with a person. |
Manage User Roles |
Allows management of user roles assignments. |
Use REST Service - Public Workers Read Only |
Allows the user to call the GET method associated with the Public Workers REST Service. |
View Portrait User Account Details Card |
Views the User Account Details card in the Person Gallery. |
Privileges
This table lists privileges granted to duties of the IT Security Manager job role.
Granted Role | Granted Role Description | Privilege | Privilege Description |
---|---|---|---|
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Execute Setup Tasks |
Allows setup task execution and searching of tasks and tasks lists. |
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Review Applications Offering |
Provides access to the Getting Started page. |
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Review Setups Functional User Overview |
Allows access to the Assigned Implementation Tasks page. |
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Setup and Maintain Applications |
Allows access to the Setup and Maintenance work area. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Administer Student Group |
Allows administration of managed student groups. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Apply HCM Role Provisioning Rules |
Allows application of HCM role-provisioning rules. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Assign Oracle Fusion General Ledger Data Access Set Definition |
Allows assignment of data access sets. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Configure Interface |
Allows configuration of the interface for transaction and batch processing. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Define Oracle Fusion General Ledger Data Access Set |
Allows definition of data access sets. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Delete Access Group |
Allows the user to delete an access group. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Delete Scheduled Process Tracker |
Allows deletion of scheduled process tracking information. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Enable and Disable Access Groups |
Allows the user to enable and disable all access groups. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Grant Search Framework Manager Permissions |
Allows granting permission to a user to manage search framework index metadata, using REST Service. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Import Workers |
Allows import of multiple worker records. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Load Batch Data |
Allows batch loading of data. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Active Directory Integration |
Allows users to use functions and services that manage the Active Directory integration |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Application Pages Security |
Allows management of application pages and page groups for controlling page access. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Candidate Security Profile |
Allows management of candidate security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Country Security Profile |
Allows management of country security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Data Access for Users |
Manage data access for user provisioned roles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Data Security Grants |
Allows the assigning of security profiles and security conditions to users. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Data Security Profiles |
Allows the mapping of business objects and fields for data security access. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Document Type Security Profile |
Allows management of document type security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Group Access |
Allows configuring Access Groups. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage HCM Data Role |
Allows management of HCM data roles and assignment of security profiles to those roles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage HCM Exclusion Rules |
Allows management of the rules for excluding specified data instances from a person security profile data instance set. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage HCM LDAP User Account Options |
Allows management of HCM LDAP user account options. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage HCM Role Provisioning Rules |
Allows management of HCM role-provisioning rules and creation of auto provisioned role requests for all users based on current role-provisioning rules. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Job Requisition Security Profile |
Allows management of job requisition security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Legislative Data Group Security Profile |
Allows management of legislative data group security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Oracle Search ACL Exclusion Rules for HCM |
Allows management of the rules for excluding specified roles and users from the Oracle Search access control lists that are maintained by the HCM access control list computation process. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Organization Security Profile |
Allows management of organization security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Page Permissions Security |
Allows management of page permissions for functional security. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Payroll Element Security Profile |
Allows users to manage payroll element security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Payroll Flow Security Profile |
Manage Payroll Flow Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Payroll Security Profile |
Manage Payroll Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Person Security Profile |
Allows management of person security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Person and Assignment Security Profile |
Allows management of person and assignment security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Position Security Profile |
Allows management of position security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Profile Content Section Access |
Manages view and update access to content sections for user roles or manages addition of user roles with view or update access to content sections. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Run Results |
Allows management of run results. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Sales and Service Access |
Allows configuring access for Sales and Service objects. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Security Roles |
Allows management of security roles and role groups. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Student Group Configurations |
Allows management of common managed student group configurations. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Student Management Home Page Setups |
Allows management of Student Management home page setups. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Supplier User Roles |
Allows managing the set of authorized job roles for supplier user provisioning. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Talent Pool Security Profile |
Allows management of talent pool security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Transaction Security Profile |
Allows management of transaction security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Workforce Structures Work Area |
Allows access to the Work Structures Management work area. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Monitor Batch Load Process |
Allows monitoring of the batch load process. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Preview HCM Data Security |
Allows access to preview and analyze user access to secured HCM data. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Request Enterprise Role |
Allows request of a new enterprise role. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Reset Password |
Allows reset password links to be emailed to users. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Batch Load Job Set |
Allows running of the batch load job set. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Data Access Set Listing Report |
Allows submission of the data access set listing report. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Regenerate HCM Data Security Grants Process |
Allows the Regenerate HCM Data Security Grants process to be run. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Retrieve Latest LDAP Changes Process |
Allows the Retrieve Latest LDAP Changes process to be run. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Send Pending LDAP Requests Process |
Allows the Send Pending LDAP Requests process to be run. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Users by Service Report |
Submit Users by Service Report |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Use REST Service - Identity Integration |
Allows users to call all methods associated with the Identity Integration REST Service |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Use REST Service - Users and Roles Lists of Values |
Allows the user to call the GET method associated with the Users and Roles lists of values REST Services. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Access Explorer |
Allows to explore the access an user has for a named record of an object using the access explorer tool. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Application Pages Security |
Allows viewing of application pages and page groups for controlling page access. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Business Objects |
Allows the viewing of business objects that are used for security profiles. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Data Security Grants |
Allows the viewing of the security conditions assigned to the users that govern data access by users. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Data Security Profiles |
Allows the viewing of security profiles, which contain the business objects and fields that govern data access by users. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Oracle Fusion General Ledger Data Access Set Definition |
Allows view access of data access set definitions and makes data access set selection. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Scheduled Process Tracker |
Allows viewing of scheduled process tracking information. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Student Management Home Page Setups |
Allows viewing of Student Management home page setups. |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View User Accounts |
Allows the viewing of user accounts. |
Manage User Account |
Manages user roles. |
Copy Personal Data to LDAP |
Allows copy of worker personal data to LDAP |
Manage User Account |
Manages user roles. |
Manage User Account |
Allows access to Manage User Account. |
Manage User Account |
Manages user roles. |
Manage User Account and My Account |
Allows access to the page components that are common to My Account and Manage User Account. |
Manage User Account |
Manages user roles. |
Reset Password |
Allows reset password links to be emailed to users. |
Manage Users |
Creates and updates users and assigns roles to users. |
Manage User Details |
Allows management of user account information. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Assign Partner Account |
Privilege to assign partner accounts to channel manager territores. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Create Partner |
Allows creating a partner. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Create Partner Member |
Allows creating a partner member. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Create Partner User |
Allows provisioning of partner members to sign into the vendor partner network. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Import Partner |
Not Available |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Manage Enrollment Notes |
Allows managing partner program enrollment notes |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Manage Partner Account Team |
Allows managing of the partner account teams. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Manage Partner User Security Role |
Allows managing of security roles for partner members |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Remove Partner Member |
Allows removing a partner member from a partner organization. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Run Purge Batch Assignment Information Process |
Allows scheduling and monitoring of the process to purge the batch assignment data. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Update Partner Member |
Allows managing of partner members. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Update Partner Profile |
Allows managing of partner profiles. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
View Partner |
Allows viewing a list of partners from the partner work area. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
View Partner Contract |
Provides access to Partner Contracts in Partner Center. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Manage System Security Options |
Allows configuration of masking, encryption, wallet, and other security options. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Manage Wallet |
Allows configuration of encryption and decryption using the wallet. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Decryption Process |
Allows submission of the Credit Card Decryption process. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Detokenization Process |
Not Available |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Encryption Process |
Allows submission of the Credit Card Encryption process. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Masking Process |
Allows submission of the Credit Card Masking process. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Tokenization Process |
Not Available |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Import Credential Process |
Allows submission of the Import Credential process. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Payments Sensitive Data Decryption |
Allows submission of the Sensitive Data Decryption process. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Payments Sensitive Data Encryption |
Allows submission of the Sensitive Data Encryption process. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Third Party Bank Account Decryption Process |
Allows submission of the Third Party Bank Account Decryption process. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Third Party Bank Account Encryption Process |
Allows submission of the Third Party Bank Account Encryption process. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Third Party Bank Account Masking Process |
Allows submission of the Third Party Bank Account Masking process. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Transaction Encryption Process |
Allows submission of the Transaction Encryption process. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Administer API Authentication |
Allows users to configure and manage both inbound and outbound API Authentication. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Administer App Extensions |
Manage App Extensions |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Administer SSO |
Manage Single Sign-on Administration |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Administer Security |
Manage security configuration and preferences. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Analyze Security |
Analyze security including roles by category, and user role memberships. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Create Role |
Create new role from scratch or by copying an existing role. Create role relationships. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Create User Account |
Create new user account and provision roles to that user account. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Delete User Account |
Delete an existing user account and its role memberships. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Edit Role |
Edit an existing role and its relationships. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Edit User Account |
Edit an existing user account and its role memberships including password reset and locking actions. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Enable Database Resource Management |
Enable management of database resource including attributes, conditions and policies. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Enable Two-Factor Authentication for User Account |
Allows Two-Factor authentication for user accounts to be enabled and disabled using the security console. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Export Certificate |
Export an existing digital certificate. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Generate Certificate |
Generate a new self-signed digital certificate or Regenerate a self-signed or trusted digital certificate. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Import Certificate |
Import a new or existing digital certificate. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Import Users and Roles |
Imports Users and Roles from identity store and policy store. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Lock and Unlock User Account |
Allows user accounts to be locked and unlocked using the security console. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Manage All Application Profile Values |
Allows management of all application profile option settings and values at various levels to control application behavior. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Manage Scheduled Processes |
Allows managment of Scheduled Processes |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Run Password Expiry Job |
Submit Password Expiry |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Update Password for User Account |
Allows user account passwords to be updated using the security console. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
View App Extensions |
Allows users to view app extensions. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
View Certificate |
Search and view an existing digital certificate. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
View Role |
Search and view an existing role and its relationships. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
View User Account |
Search and view an existing user account. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Analyze Security |
Analyze security including roles by category, and user role memberships. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Import User Login History |
Imports last login timestamp for users. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Manage All Application Profile Values |
Allows management of all application profile option settings and values at various levels to control application behavior. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Manage Reports and Analytics |
Allows access to the Reports and Analytics from Navigator Menu. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Manage Scheduled Processes |
Allows managment of Scheduled Processes |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run Inactive Users Report |
Submit inactive users report. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run Privilege Discoverer Report |
Submit Privilege Discoverer report. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run Role Hierarchy Optimization Report |
Submit role hierarchy optimization report. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run User Access Audit Report |
Submit user and role access audit report. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run User Password Changes Audit Report |
Submit User Password Changes Audit Report |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run User Role Membership Report |
Submit User Role Membership report. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
View Role |
Search and view an existing role and its relationships. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
View User Account |
Search and view an existing user account. |
Separation of Duties Role Analysis |
Allows user to analyze separation of duty violations on a new or existing role in security. |
Use REST Service for Advanced Access Control Role Analysis |
Allows users to call all methods associated with the advanced access control role analysis REST resource |
Separation of Duties Role Analysis |
Allows user to analyze separation of duty violations on a new or existing role in security. |
View Access Provisioning Rules |
Allows user to view provisioning rules. |
Data Security Policies
This table lists data security policies and their enforcement across analytics application for the IT Security Manager job role.
Business Object | Policy Description | Policy Store Implementation |
---|---|---|
Application Objects |
A It Security Manager can manage application objects for all applications common objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
A It Security Manager can manage application objects for all customer relationship management application objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
A It Security Manager can manage application objects for all financial supply chain manufacturing application objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
A It Security Manager can manage application objects for all human capital management application objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
A It Security Manager can manage application objects for all objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
An IT Security Manager can manage application objects for all objects |
Role: Security Management Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Reference Territory |
A It Security Manager can choose application reference territory for all application reference territories in the enterprise |
Role: IT Security Manager Privilege: Choose Application Reference Territory (Data) Resource: Application Reference Territory |
Assignment Grade |
A It Security Manager can choose assignment grade for all grades in the enterprise |
Role: IT Security Manager Privilege: Choose Assignment Grade (Data) Resource: Assignment Grade |
Business Unit |
A It Security Manager can choose business unit for all business units in the enterprise |
Role: IT Security Manager Privilege: Choose Business Unit Organization (Data) Resource: Business Unit |
Business Unit |
A It Security Manager can choose business unit for business units in their organization security profile |
Role: IT Security Manager Privilege: Choose Business Unit Organization (Data) Resource: Business Unit |
Department |
A It Security Manager can choose department for all departments in the enterprise |
Role: IT Security Manager Privilege: Choose Department (Data) Resource: Department |
File Import Activity |
An IT Security Manager can view standard file import activity object type for all standard file import activities that are accessible for partner account administration duty |
Role: Partner Account Administration Privilege: View Standard File Import Activity Object Type Resource: File Import Activity |
File Import Mapping |
An IT Security Manager can view standard file import mapping object type for all standard file import maps that are accessible for partner account administration duty |
Role: Partner Account Administration Privilege: View Standard File Import Mapping Object Type Resource: File Import Mapping |
HR Job |
A It Security Manager can choose hr job for all jobs in the enterprise |
Role: IT Security Manager Privilege: Choose HR Job (Data) Resource: HR Job |
Legal Employer |
A It Security Manager can choose legal employer for all legal employers in the enterprise |
Role: IT Security Manager Privilege: Choose Legal Employer (Data) Resource: Legal Employer |
Legal Employer |
A It Security Manager can choose legal employer for legal employers in their organization security profile |
Role: IT Security Manager Privilege: Choose Legal Employer (Data) Resource: Legal Employer |
Legislative Data Group |
A It Security Manager can choose legislative data group for all legislative data groups in the enterprise |
Role: IT Security Manager Privilege: Choose Legislative Data Group (Data) Resource: Legislative Data Group |
Location |
A It Security Manager can choose location for all locations in the enterprise |
Role: IT Security Manager Privilege: Choose Location (Data) Resource: Location |
Managed Student Group |
A It Security Manager can manage managed student group for all managed student groups |
Role: IT Security Manager Privilege: Manage Student Group (Data) Resource: Managed Student Group |
Person Assignment |
An IT Security Manager can search worker for persons and assignments in their person and assignment security profile |
Role: Manage Users Privilege: Search Worker (Data) Resource: Person Assignment |
Person Assignment |
An IT Security Manager can view person assignment for persons and assignments in their person and assignment security profile |
Role: Manage Users Privilege: View Person Assignment (Data) Resource: Person Assignment |
Person Type |
A It Security Manager can choose person type for any person type |
Role: IT Security Manager Privilege: Choose Person Type (Data) Resource: Person Type |
Person Type |
An IT Security Manager can choose person type for person types in their person type security profile |
Role: Manage Users Privilege: Choose Person Type (Data) Resource: Person Type |
Position |
A It Security Manager can choose position for all positions in the enterprise |
Role: IT Security Manager Privilege: Choose Position (Data) Resource: Position |
Public Assignment |
An IT Security Manager can search person deferred for persons and assignments in their public person security profile |
Role: Use REST Service - Public Workers Read Only Privilege: Search Person Deferred (Data) Resource: Public Assignment |
Public Assignment |
An IT Security Manager can view person deferred for persons and assignments in their public person security profile |
Role: Use REST Service - Public Workers Read Only Privilege: View Person Deferred (Data) Resource: Public Assignment |
Public Person |
A It Security Manager can choose public person for all people in the enterprise |
Role: IT Security Manager Privilege: Choose Public Person (Data) Resource: Public Person |
Public Person |
A It Security Manager can search public person for all people in the enterprise |
Role: IT Security Manager Privilege: Search Person Deferred (Data) Resource: Public Person |
Public Person |
An IT Security Manager can search person deferred for persons and assignments in their public person security profile |
Role: Use REST Service - Public Workers Read Only Privilege: Search Person Deferred (Data) Resource: Public Person |
Public Person |
An IT Security Manager can view person deferred for persons and assignments in their public person security profile |
Role: Use REST Service - Public Workers Read Only Privilege: View Person Deferred (Data) Resource: Public Person |
Sales Objects |
An IT Security Manager can view standard file import export object type for all standard file import export objects that are accessible for partner account administration duty |
Role: Partner Account Administration Privilege: View Standard File Import Export Object Type Resource: Sales Objects |
User |
An IT Security Manager can edit user name for persons in their person security profile. |
Role: Edit User Name Privilege: Edit User Name (Data) Resource: User |
User |
An IT Security Manager can link user account for persons and assignments in their person and assignment security profile |
Role: Manage User Account Privilege: Link User Account (Data) Resource: User |
User |
An IT Security Manager can manage user accounts for persons and assignments in their person and assignment security profile |
Role: Manage User Account Privilege: Manage User Accounts (Data) Resource: User |
User |
An IT Security Manager can view user accounts for persons and assignments in their person and assignment security profile |
Role: Manage User Account Privilege: View User Accounts (Data) Resource: User |