How do I preview HCM data security?
Title and music.
Sometimes users may report problems with accessing secured data, such as person and organization records. As users typically have multiple roles, diagnosing these problems can be challenging. In this video, I’ll show you how to use the Preview HCM Data Security page to analyze data access for a user when problems like these come up.
Most data access problems are one of the following types:
-
The user expects to access a secured object, such as a person record, but the record isn’t accessible.
-
The user expects to perform an action for a person, such as Promote Worker, but the action isn’t available.
-
The user can access a secured object, such as a person, but the object shouldn’t be accessible.
-
The user can perform an action on an object, but the action shouldn’t be available.
To investigate these problems, start by identifying what the user was trying to do. For example, maybe the user found the required person record but couldn't promote them. Then identify the data security privilege and data resource that control this access. As an alternative, identify the data security policy and aggregate privilege associated with the problem. This is information you’ll need to use the Preview HCM Data Security page.
You can access this page from the My Client Groups, Workforce Structures page if you have an IT Security Manager role with the Preview HCM Data Security privilege.
From the Home page, click My Client Groups.
Under the Quick Actions section, click Show More.
In the Workforce Structures section, click Preview HCM Data Security.
On the Preview HCM Data Security page, select the user who is having the access issue.
On the Preview HCM Data Security page, in the User Name drop-down list, select CURTIS.FEITTY.
Next, you search for the privilege and data resource associated with the data access issue.
In Privilege drop-down list, select Search Person Live Data.
In the Data Resource drop-down list, select Person Detail.
If you know the aggregate privilege or data security policy associated with the issue, you can search for that, and then the other fields will populate automatically. Then click Preview Access.
Click Preview Access.
You can then review their currently assigned roles and security profiles, and their assigned Areas of Responsibility. In the Verify Access For field, search for the record that the user should or shouldn’t be able to access. The object you search for is dependent on the data resource you selected. Because I selected Person Detail as a data resource, the record I select here will be a person. Then click Verify.
In the Secured Access Summary section, in the Verify Access For drop-down list, select Majors, Rosa.
Click Verify.
With this you will be able to verify the data access. You can then include, or exclude, the person records by modifying the respective security profile or by making changes to the respective role.
For more information on this topic, you can view the courses on Oracle University or reference the available guides on Oracle Help Center.
Thanks for watching.
Oracle copyright and music.