Overview of Securing Oracle Student Management Cloud
Oracle Student Management Cloud is secured as delivered. You need to enable user access to the Student Management functions and data by configuring the various security tasks.
This guide explains how to do so. This topic summarizes the contents of each chapter.
Guide Structure
This table describes the contents of each chapter in this guide.
Chapter |
Contents |
---|---|
An Introduction to Student Management Security in the Cloud |
An overview of the concepts of role-based security and an introduction to the Oracle Cloud Applications Security Console |
Implementation Users Management |
Why implementation users are needed and how you create them |
Applications Security Setup |
How you set up the enterprise options on the Security Console and maintain the Oracle Cloud Applications security tables |
Application Users Setup |
What are the enterprise-wide options that affect application users, and how you set them up |
Application Users Management |
How you create and manage the accounts for application users |
Role Provisioning for Application Users |
What are some of the standard role mappings, and how you create and manage them for application users |
Location-Based Access |
How location-based access works, and what you must do to enable or disable this access, allowlisting certain IP addresses, and making certain roles public |
Single Sign-On |
How you set up single sign-on |
Export and Import of Security Data and Role Hierarchy |
How you migrate Security Console setup data and custom role hierarchy from one environment to another |
Reports for Application Users and Roles |
What are the reports that you can look at for user accounts, inactive users, role provisioning, and password changes |
Security Console |
How you use the Security Console to review role hierarchies and role analytics |
Job, Abstract, and Duty Roles |
How you create roles either from the beginning or by copying predefined roles, and how you edit custom roles |
Roles for Workflow Access |
What are the predefined roles that enable access to the Workflow feature |
Role Optimization |
How you use the optional Role Optimization Report to analyze the role hierarchy for redundancies and other inefficiencies |
During implementation, you do certain security-related tasks from a functional area task list or for an implementation project. After the implementation is complete, you can do most of the security-related tasks through the Security Console.