Glossary


A | B | C | D | E | F | G | H | J | L | M | N | P | R | S | T | U | W

A

abstract role
A description of a person's function in the enterprise that's unrelated to the person's job (position), such as employee, contingent worker, or line manager.
action
The kind of access, such as view or edit, named in a security policy.
aggregate privilege
A predefined role that combines one function security privilege with related data security policies.
assignment
A set of information, including job, position, pay, compensation, managers, working hours, and work location, that defines a worker's or nonworker's role in a legal employer.

B

business unit
A unit of an enterprise that performs one or many business functions that can be rolled up in a management hierarchy.

C

candidate
In a succession plan, a person identified to fill a job or position or replace a named incumbent.
competency
Any measurable behavior required by an organization, job, or position that a person may demonstrate in the work context. A competency can be a piece of knowledge, a skill, an attitude, or an attribute.
condition
The part of a data security policy that specifies what portions of a database resource are secured.
content type
An attribute such as a skill, quality, or qualification that is added to a profile.
contingent worker
A self-employed or agency-supplied worker. Contingent worker work relationships with legal employers are typically of a specified duration. Any person who has a contingent worker work relationship with a legal employer is a contingent worker.

D

data dimension
A stripe of data accessible by a user. Sometimes referred to as data security context.
data instance set
The set of HCM data, such as one or more persons, organizations, or payrolls, identified by an HCM security profile.
data role
A role for a defined set of data describing the job a user does within that defined set of data. A data role inherits job or abstract roles and grants entitlement to access data within a specific dimension of data based on data security policies. A type of enterprise role.
data security
The control of access and action a user can take against which data.
data security policy
A grant of entitlement to a role on an object or attribute group for a given condition.
database resource
An applications data object at the instance, instance set, or global level, which is secured by data security policies.
delegated role
A job, abstract, or data role that a user, known as the delegator, assigns to another user, known as the proxy user.
department
A division of a business enterprise dealing with a particular area of activity.
division
A business-oriented subdivision within an enterprise. Each division is organized to deliver products and services or address different markets.
document type
A categorization of person documents that provides a set of options to control what document information to retain, who can access the documents, whether the documents require approval, and whether the documents are subject to expiry. A document type exists for a combination of document category and subcategory.
duty role
A group of function and data privileges representing one duty of a job. Duty roles are specific to applications, stored in the policy store, and shared within an application instance.

E

effective start date
For a date-effective object, the start date of a physical record in the object's history. A physical record is available to transactions between its effective start and end dates.
enterprise
An organization having common control over one or more legal entities.
entitlement
Grant of access to functions and data. Oracle Fusion Middleware term for privilege.

F

flexfield
A flexible data field that you can configure such that it contains one or more segments or stores additional information. Each segment has a value and a meaning.
flexfield segment
An extensible data field that represents an attribute and captures a value corresponding to a predefined, single extension column in the database. A segment appears globally or based on a context of other captured information.
function security
The control of access to a page or a specific use of a page. Function security controls what a user can do.

G

generic organization hierarchy
An organization hierarchy that includes organizations of all classifications.
grade
A component of the employment model that defines the level of compensation for a worker.

H

HCM
Abbreviation for Human Capital Management.
HCM data role
A job role, such as benefits administrator, associated with instances of HCM data, such as all employees in a department.
HCM securing object
An HCM object that secures access to data in related objects. For example, access to specified person records allows access to data secured by person records, such as goal plans and evaluations.

J

job
A generic role that's independent of any single department or location. For example, the jobs Manager and Consultant can occur in many departments.
job role
A role, such as an accounts payable manager or application implementation consultant, that usually identifies and aggregates the duties or responsibilities that make up the job.

L

LDAP
Abbreviation for Lightweight Directory Access Protocol.
LDG
Abbreviation for legislative data group.
A legal entity that employs people.
An entity identified and given rights and responsibilities by commercial law through the registration with country's appropriate authority.
legislative data group
A means of partitioning payroll and related data. At least one legislative data group is required for each country where the enterprise operates. Each legislative data group is associated with one or more payroll statutory units.

M

managed person
A person for whom a user can maintain some information. For example, line managers can maintain information about their direct and indirect reports.

N

nonworker
A person, such as a volunteer or retiree, who is not engaged in the core businesses of the enterprise or legal employer but who may receive payments from a legal employer. Any person who has a nonworker work relationship with a legal employer is a nonworker.

P

party
A physical entity, such as a person, organization or group, that the deploying company has an interest in tracking.
pending worker
A person who will be hired or start a contingent worker placement and for whom you create a person record that's effective before the hire or start date.
person number
A person ID that is unique in the enterprise, allocated automatically or manually, and valid throughout the enterprise for all of a person's work and person-to-person relationships.
person profile
A collection of skills, experience, qualifications, work preferences, and career planning information for a worker.
person type
A subcategory of a system person type, which the enterprise can define. Person type is specified for a person at the assignment level.
position
A specific occurrence of one job that's fixed within a department. It's also often restricted to one location. For example, the position Finance Manager is an instance of the job Manager in the Finance Department.
public person
A person for whom basic information, such as name and phone, is available to all workers in worker directories and elsewhere.

R

resource
People designated as able to be assigned to work objects, for example, service agents, sales managers, or partner contacts. A sales manager and partner contact can be assigned to work on a lead or opportunity. A service agent can be assigned to a service request.
role
Controls access to application functions and data.
role mapping
A relationship between one or more roles and one or more assignment conditions. Users with at least one assignment that matches the conditions qualify for the associated roles.
role provisioning
The automatic or manual allocation of a role to a user.

S

security profile
A set of criteria that identifies HCM objects of a single type for the purposes of securing access to those objects. The relevant HCM objects are persons, organizations, positions, countries, LDGs, document types, payrolls, and payroll flows.
security reference implementation
Predefined function and data security that includes role based access control, and policies that protect functions, and data. The reference implementation supports identity management, access provisioning, and security enforcement across the tools, data transformations, access methods, and the information life cycle of an enterprise.
SQL predicate
A type of condition using SQL to constrain the data secured by a data security policy.
subject area
A set of columns, or pieces of data, related to a specific business object or area.
succession plan
A plan that identifies candidates for a role or position or to succeed a named incumbent.
system person type
A fixed name that the application uses to identify a group of people.

T

tax reporting unit
A legal entity that groups workers for the purpose of tax and social insurance reporting.

U

URL
Abbreviation for Uniform Resource Locator.
user person type
A name, derived from a system person type, that you can configure to your requirements to identify a group of people.

W

work area
A set of pages containing the tasks, searches, and other content you need to accomplish a business goal.
work relationship
An association between a person and a legal employer, where the worker type determines whether the relationship is a nonworker, contingent worker, or employee work relationship.
worker type
A classification selected on a person's work relationship, which can be employee, contingent worker, pending worker, or nonworker.
workflow
An automated process that passes a task from one user (or group of users) to another to view or act on. The task is routed in a logical sequence to achieve an end result.