Overview of Securing Oracle Student Management Cloud

Oracle Student Management Cloud is secured as delivered. You need to enable user access to the Student Management functions and data by configuring the various security tasks.

This guide explains how to do so. This topic summarizes the contents of each chapter.

Guide Structure

This table describes the contents of each chapter in this guide.

Chapter

Contents

An Introduction to Student Management Security in the Cloud

An overview of the concepts of role-based security and an introduction to the Oracle Cloud Applications Security Console

Implementation Users Management

Why implementation users are needed and how you create them

Applications Security Setup

How you set up the enterprise options on the Security Console and maintain the Oracle Cloud Applications security tables

Application Users Setup

What are the enterprise-wide options that affect application users, and how you set them up

Application Users Management

How you create and manage the accounts for application users

Role Provisioning for Application Users

What are some of the standard role mappings, and how you create and manage them for application users

Location-Based Access

How location-based access works, and what you must do to enable or disable this access, allowlisting certain IP addresses, and making certain roles public

Single Sign-On

How you set up single sign-on

Export and Import of Security Data and Role Hierarchy

How you migrate Security Console setup data and custom role hierarchy from one environment to another

Reports for Application Users and Roles

What are the reports that you can look at for user accounts, inactive users, role provisioning, and password changes

Security Console

How you use the Security Console to review role hierarchies and role analytics

Job, Abstract, and Duty Roles

How you create roles either from the beginning or by copying predefined roles, and how you edit custom roles

Roles for Workflow Access

What are the predefined roles that enable access to the Workflow feature

Role Optimization

How you use the optional Role Optimization Report to analyze the role hierarchy for redundancies and other inefficiencies

During implementation, you do certain security-related tasks from a functional area task list or for an implementation project. After the implementation is complete, you can do most of the security-related tasks through the Security Console.