Overview of Security
Oracle Enterprise Resource Planning Cloud (Oracle ERP Cloud) and Oracle Supply Chain Management Cloud (Oracle SCM Cloud) are secure as delivered; they limit access to one initial setup user.
To enable application users to access application functions and data, you perform security-related tasks in these areas, as appropriate:
-
Define Security for Financials
-
Define Security for Procurement
-
Define Users and Security for Product Management
-
Define Security for Project Execution Management
-
Manage Data Access for Users
-
Define Security for Supply Chain Management
For more information on ERP and SCM security setup and task instructions, see these guides:
-
Oracle Enterprise Resource Planning Cloud: Securing Oracle ERP Cloud.
-
Oracle Supply Chain Management Cloud: Securing Oracle SCM Cloud.
You can perform these tasks both during implementation, and later as requirements come up.
Manage Job Roles
The Oracle ERP Cloud and Oracle SCM Cloud security reference implementations provide many predefined job roles. Use the Manage Job Roles task to do these tasks:
-
Review the role hierarchy and other properties of a job or abstract role.
-
Create custom job and abstract roles.
-
View the roles assigned to a user.
-
View the users who have a specific role.
To do these tasks, a user must have the IT Security Manager job role.
Manage Duties
The Oracle ERP Cloud and Oracle SCM Cloud security reference implementations provide many predefined duty roles. Use the Manage Duties task to do these tasks:
-
Review the duties of a job or abstract role.
-
Manage the duties of a custom job or abstract role.
-
Create custom duty roles.
To do these tasks, a user must have the IT Security Manager job role.
Define Data Security
You can manage Oracle ERP Cloud and Oracle SCM Cloud application data using tasks related to these areas:
-
Define Data Security for Financials
-
Define Data Security for Procurement
-
Define Data Security for Product Management
-
Define Data Security for Project Financial Management
-
Define Data Security for Supply Chain Management
For instance, you can manage this information:
-
Data access sets that secure ledgers.
-
Human Capital Management (HCM) security profiles that facilitate data role for application users.
-
Data security policies that determine grants of entitlement to a user or role on an object or attribute group.
To do these tasks, a user must have the IT Security Manager job role.
Manage Role Provisioning Rules
You create role mappings to control the provisioning of all types of roles to application users by performing this task. For example, you can create a role mapping to provision the Accounts Payable Specialist role automatically to users that meet criteria specific to accounts payable users.
To do these tasks, a user must have the IT Security Manager job role.