Overview of Implementation Tasks
This topic outlines the sequence of setup tasks for implementing Product Management.
The sequence of tasks is split across the cloud service administrators and application implementation consultants.
Tasks for the Service Administrator |
Description |
---|---|
Step 1- Create a Primary Implementation User |
For your consultants to access and begin your implementation process, create the primary implementation user for your lead consultant. Once completed, this user can create additional users for the rest of the implementation team. Tip: Oracle recommends that you set up your implementation
users in the Test environment first. Migrate them to Production after
they have been tested and validated.
To create the primary user, follow these instructions:
Notify your primary implementation team member that their user ID has been created. Give them their initial password. Note: Oracle recommends that security administrators don't assign these
predefined roles directly to users. Instead, make a copy of a predefined
role, remove the privileges that your users don't need, and assign users the
role that contains only the privileges they need.
|
Step 2- Create Implementation Projects |
Optionally, create Implementation Projects in the Setup and Maintenance work area. |
Step 3- Set up Key Implementation Users and Security Profiles |
After your environments are provisioned, you as the service administrator have sufficient security abilities to create three implementation users with the necessary roles. |
Tasks for Application Implementation Consultant |
Description |
---|---|
Step 4- Create Data Roles and Assign Security Profiles |
You can secure data by provisioning roles that provide the necessary access rights. Data roles apply explicit data security policies on job and abstract roles. Create and maintain data roles in the Authorization Policy Manager. Assign a predefined security profile to relevant job or abstract roles using the Oracle Human Capital Management (HCM) setup task Manage Data Role and Security Profiles. The following job and duty roles are shipped with the product. You can copy these to create additional roles as necessary: Innovation Management:
Product Development:
Product Hub:
Note: Oracle recommends that security administrators don't assign these
predefined roles directly to users. Instead, make a copy of a predefined
role, remove the privileges that your users don't need, and assign users the
role that contains only the privileges they need.
|
Step 5- Create End Users |
To create end users, follow these instructions:
Note: Innovation Management includes additional steps.
|
Step 6- Perform Common Application Configuration |
For more detailed information on common implementation tasks for all SCM products, see Oracle Fusion Cloud SCM: Implementing Common Features for SCM guide. |