The Dos and Don'ts for Using the Security Console
The Security Console is a powerful tool, but you don't need all of its power for your initial setup. Here's an overview of the Security Console tabs and their uses. Only setup users, or other users with the IT Security Manager job role, can access the Security Console.
Tab |
Dos and Don'ts |
---|---|
Roles |
Create your own roles as described in Securing Sales and Service guide. |
Users |
|
Analytics |
Review role assignments and compare roles. This advanced security functionality is covered in the Securing Sales and Service guide. |
Certificates |
The sales application doesn't use this functionality. |
User Categories |
Specify password policies and manage notifications users receive about their accounts and passwords. You can specify different behavior for different categories of users. For the sales application, all the users you create are initially assigned to the Default category. But you can create additional user categories and move users to them. |
Single Sign-On |
Configure single sign-on. |
API Authentication |
Used for defining JSON Web Tokens other applications can use to validate themselves with Oracle CX Sales and Fusion Service. |
Administration |
Use to set role copying preferences and other advanced features covered in the Securing Sales and Service guide. |
You can find information about more advanced tasks, including security configuration, in the Securing Sales and Service and the Extending Sales and Service guides.