How do I create a data role?
Title and music.
In this video, we’ll show you how to create a data role using role-based security in Oracle’s Fusion Cloud applications for HCM.
Before we create a data role in the system. Let’s first review the basic implementation steps.
-
Evaluate whether the pre-defined jobs in the system align with jobs in your organization.
-
Evaluate the predefined or custom security profiles and create a custom security profile if needed.
-
Create a custom job role by duplicating an existing job role and removing or adding specific privileges.
-
Revoke the security profiles on the custom job role so there are no security profiles attached to it.
-
Using this custom job role, create a data role by assigning the job role plus any security profiles.
-
Provision the new data role to the appropriate workers.
In the system, create a data role by first going to My Client Groups, Workforce structures, and then selecting Data Roles and Security Profiles
From the Home page, click My Client Groups.
Click Workforce Structures.
In the Data Role section, click Data Roles and Security Profiles.
On this page, click create to create a new data role.
Click the + Create button.
Enter a Data Role name. In our example, we’ll create a data role for a Legislative Data Group.
On the Create Data Role: Select Role page, in the Data Role field, enter Legislative Data Group - US.
In the Role Description field, enter Legislative Data Group - US Data.
Next choose a job role. Remember, in order to create a data role you have to have a job role associated to it. Search for a payroll administrator job role. Select the option with the ORA code.
In the Job Role drop-down list, click Search.
In the Search and Select: Job Roles dialog box, in the Role Name field, enter Payroll Administrator.
Click Search.
Select Payroll Administrator – ORA_For_Payroll_Administrator_Job.
Click OK.
We need to further define data permissions on this role.
Click Next.
Now we will define the security criteria that will go along with the data role. All the sections have required fields.
There are generally three options at this stage.
-
Select View All for each required field if you have no further criteria to add to the existing security.
-
You can select a specific pre-defined or custom security profile for each required field.
-
Or you can also use the Create New option and create a new security profile on the fly for any category.
In our example, we’ll enter a combination of View All and specific security profiles already defined in the system. For Legislative Data Group, we’ll select a specific security profile. We’ll fill in the rest of the fields with either View All or specific security profiles.
In the Organization Security Profile drop-down list, select View All Organizations.
In the Position Security Profile drop-down list, select View All Positions.
In the LDG Security Profile drop-down list, select GSE Progress US Legislative Data Group.
In the Person section, in the Person Security Profile drop-down list, select GSE US Person.
In the Public Person section, in the Person Security Profile drop-down list,select GSE US Person.
In the Document Type Security Profile drop-down list, select View All Document Types.
In the Payroll Security Profile drop-down list, select GSE Progress US.
In the Flow Pattern Security Profile drop-down list, select View All Flows.
In the Element Security Profile drop-down list, select View All Elements.
Click Next.
Now that the security criteria is defined, you will verify each of your Security Profile selections. Click Next or click the item at the top to progress through each category paying close attention to the selections you made earlier. We’ll assume all our selections are the way we want them. Click Next.
The last step is to give a final review of your data role definition. Click Submit.
Click Next to review each item until you reach the Create Data Role: Review page.
Click Submit.
Back on the search page, do a quick search for the data role just created.
On the Data Roles and Security Profiles search page, in the Role field, enter legislative.
Click Search.
Notice the Inherited Job Role is listed and the green check mark in the Security Profiles Assigned column.
Now your data role is available for provisioning to your users.
For more information, you can view the courses on Oracle University or reference the available guides on Oracle Help Center.
Thanks for watching.
Oracle copyright and music.