Security Overview

Financial Consolidation and Close implements several security layers to ensure security. Infrastructure security components, which are implemented and managed by Oracle, create a highly secure environment for the service. The service ensures security with password-protected single sign-on, and role-based access to data and artifacts.

Setting up security requires these steps:

  • Create users and assign them access to the application. See the Getting Started with Oracle Enterprise Performance Management Cloud for Administrators guide.

    The Identity Domain Administrator creates the users and assigns them access to the application.

  • Assign users role access to the application. See the Getting Started with Oracle Enterprise Performance Management Cloud for Administrators guide.

    The Identity Domain Administrator assigns users role access to the application.

  • Assign users access to artifacts. See Assigning User Access to Artifacts.

    Users are assigned access to artifacts in the application. These artifacts include forms, journals, task lists, and reports. This access is given to users by the creators of the artifacts or by the Service Administrator.

  • Assign users access to data. See Assigning User Access to Data.

    Users are assigned access to artifacts in the application. These artifacts include forms, journals, task lists, and reports. This access is given to users by the creators of the artifacts or by the Service Administrator.

    The Service Administrator assigns access to data through access to dimension members. Users are assigned either Write, View, or None access to members of a dimension.

A Service Administrator can also use REST API commands to import security records or access control list (ACL) records from a Comma Separated Values (CSV) file. See the "Import Security" topic in REST API for Oracle Enterprise Performance Management Cloud. Note that the valid Write Access Type for Financial Consolidation and Close is READWRITE.

Watch the following video for an introduction to security:

Video icon Understanding Security