How do I control job requisition visibility?
Title and music.
Viewing job requisitions can range from viewing very few requisitions to viewing all requisitions. By default, users can see requisitions for their own team and those of their subordinates. This scenario can be an issue when a user, such as a recruiter, needs to access more job requisitions. In another scenario, a user may have access to too many requisitions.
Let’s walk through an example of a recruiter who currently has default access but needs to view more requisitions within a certain recruiting location according to a job requisition security profile.
To configure this access, we will go through the following steps:
-
View available job requisition security profiles and create a new one if needed.
-
Identify the role of the user that contains job requisition privileges.
-
Edit the data role to verify the job requisition security profiles and change if needed.
-
Verify the AOR aligns to the security profile definition.
Start by viewing your organization’s available job requisition security profiles. To do this, navigate to Workforce structures and click Job Requisition Security Profiles.
Sign in as a user with security configuration privileges.
From the Home page, click Client Groups.
Click the Workforce Structures app.
In the Security Profiles section, click the Job Requisition Security Profiles hyperlink.
Click search to see the current list of available profiles. By default, the system includes the option to view the user’s and subordinates requisitions and view all job requisitions. There may be additional custom profiles listed here as well.
Click the Search button.
In the Name column note two security profiles: View My Team's Requisitions and View All Job Requisitions.
Click Create to add a new profile if none meet your needs. In this case, we will create a security profile for job requisitions secured by recruiting location.
Click Create.
In the Name field, enter Requisitions Secured by Recruiting Location.
In the area of responsibility, take note of the Responsibility type for later (Recruitment Representative). Secure the profile by Location.
Select the Secure by Area of Responsibility check box.
Select the Secure by Location check box.
You should also secure the profile by Hiring Team Member Type. We’ll add the Recruiter, Hiring Manager, and all Collaborators.
In the Hiring Team Member Type section, check the Secure by Hiring Team Member Type check box.
Click the + icon.
In the Add Hiring Team Member type drop-down list, select Recruiter.
Click the + icon.
In the Add Hiring Team Member type drop-down list, select Hiring Manager.
Click the + icon.
In the Add Hiring Team Member type drop-down list, select All Collaborators.
Click Save and Close.
Now that you have the desired job requisition security profile in place, navigate to the Security Console and locate the user with the issue.
Click Home.
Click the Navigator icon.
Expand the Tools section.
Click Security Console.
On the left panel, click Users.
In the Search field, enter Rowe. This last name of the user with the issue.
In the Display Name column, click the Sheridan Rowe hyperlink.
Under roles, identify the role containing the View Job Requisition Privilege. In this case, it’s the Recruiter_US role. Take note of the role name or code.
On the User Account Details page, in the Roles column, view the roles assigned to the user.
Next you will search for the role. Navigate to Workforce Structures and Data Roles and Security Profiles.
Click Home.
Click Workforce Structures.
In the Data Role section, select Data Roles and Security Profiles.
Search for the role by name or code and click Edit.
On the Data Roles and Security Profiles page, in the Role field, enter the Recruiter_US.
Click Search.
Click in the Recruiter_US row.
Click Edit.
Click Next to view the Security Criteria on the role.
On the Edit Data Role: Role Details page, click Next.
View the drop-down list on the Job Requisition Security Profile and select the new security profile you created earlier.
In the Job Requisition section, in the Job Requisition Security Profile drop-down list, select Requisition Security by Recruiting Location.
Once you complete the review, click Submit.
Click Next.
Click Submit.
Next, you will verify that the role has the proper job requisition security profile through the Security Console.
Click the Navigator icon.
Expand the Tools section.
Click Security Console.
Search for the role used earlier and edit.
On the Roles page, in the Search field, enter Recruiter.
Select Recruiter_US.
On the highlighted role, click the down arrow.
Select Edit Role.
At the top, click Data Security Policies to jump to that area.
At the top navigation, click Data Security Policies.
Filter by requisition in the privilege column. Here you can view the conditions of the applied data security profile for viewing job requisitions by recruiting location.
In Privilege column search field, enter View Job Requisition.
Finally, verify the area of responsibility for that user. From My Client Groups, click Show More and Area of Responsibility
Click Home.
Click My Client Groups.
Under the Quick Actions section, click Show More.
Click Area of Responsibility.
Search for the user.
In the Search field, enter Rowe.
Select the Sheridan Rowe.
From here you can edit an existing Area of Responsibility or create one. We’ll create one from a template. Select the template to edit.
From the Areas of Responsibility page, click the + Add button.
Select Responsibility from Template.
In Name drop-down list, select Recruiting_West.
The responsibility type should be set to Recruitment Representative to match the security profile from earlier.
In the Basic Info section, in the Responsibility Type field, verify that the type is set to Recruitment Representative.
You can set the Recruiting Location Hierarchy for this user to define the requisition locations that can be accessible. We’ll select the United States.
In the Responsibility Scope section, in the Recruiting Location Hierarchy drop-down list, select United States.
Now the user can access requisitions that correspond to this recruiting location. Click Submit
Click Submit.
For more information on this topic, you can view the courses on Oracle University or reference the available guides on Oracle Help Center.
Oracle copyright and music.