Securing Oracle ERP Cloud: Overview
Oracle ERP Cloud is secure as delivered. This guide explains how to enable user access to ERP functions and data. You perform some of the tasks in this guide either only or mainly during implementation. Most, however, can also be performed later and as
To manage roles, use the Security Console and other tasks available in the Setup and Maintenance work area. You may use either of these options to create or edit roles, or to view and work with them later; the choice is a matter of your preference. Some chapters in this guide discuss the use of Setup and Maintenance tasks, and later chapters discuss the use of the Security Console.
Any references to data roles in this guide are only applicable to Oracle HCM Cloud. Data roles are no longer used in Oracle ERP Cloud.
Guide Structure
This table describes the content of each chapter in this guide.
Chapter |
Content |
---|---|
Introduction |
A brief overview of role-based security concepts |
Using the Security Console |
How to set up and manage the Security Console, and use it to view role hierarchies and Navigator menus |
Managing Implementation Users |
The purpose of implementation users and how you create them |
Preparing for Application Users |
Enterprise-wide options and related decisions that affect application users |
Creating and Managing Application Users |
The different ways you can create application users and maintain user accounts, with instructions for some methods |
Provisioning Roles to Application Users |
How to use tasks available from Setup and Maintenance to enable application users to acquire roles, with instructions for creating some standard role mappings |
Configuring Security |
How to create, review, and modify security components, with recommended best practices |
Reviewing Roles and Role Assignments |
How to use the Security Console to review roles and identify the users assigned to them |
Configuring Roles in the Security Console |
How to create, review, and modify roles in the Security Console, with recommended best practices |
Managing Certificates and Keys |
How to use the Security Console to generate, import, export, and delete digital certificates |
Implementing Security in Oracle Fusion Financials |
The additional security setup and configuration tasks associated with Oracle Fusion Financials |
Implementing Security in Oracle Fusion Project Portfolio Management |
The additional security setup and configuration tasks associated with Oracle Fusion Project Portfolio Management |
Implementing Security in Oracle Fusion Procurement |
The additional security setup and configuration tasks associated with Oracle Fusion Procurement |
During implementation, you can perform security-related tasks from the Security Console if you have the IT Security Manager role. To use the Security Console, navigate to: Tools > Security Console.
For information on securing reports and analytics, see the Securing Analytics Publisher Reports and Related Components in the Oracle Cloud Administering Transactional Analyses guide.