Overview of Securing Oracle Fusion Cloud SCM

Oracle SCM Cloud is secure as delivered. This guide explains how to enable user access to SCM functions and data. You perform some of the tasks in this guide either only or mainly during implementation. Most, however, can also be performed later and as

Note: As of Release 12, data roles are no longer used in Oracle SCM Cloud. Assume that references in this guide to data roles are only applicable to Oracle HCM Cloud. For important background, details, and instructions, see the Oracle ERP Cloud and Oracle SCM Cloud Security Upgrade Guide (2211555.1) on My Oracle Support at https://support.oracle.com.

Guide Structure

The following table describes the contents of each chapter in this guide.

Chapter

Contents

Introduction

A brief introduction to the concepts of role-based security

Using the Security Console

How to set up and manage the centralized security work area

Managing Implementation Users

The purpose of implementation users and how you create them

Preparing for Application Users

Enterprise-wide options and related decisions that affect application users

Creating and Managing Application Users

The different ways you can create application users and maintain user accounts, with instructions for some methods

Provisioning Roles to Application Users

The ways that application users can acquire roles, with instructions for creating some standard role mappings

Configuring Security

How to create, review, and modify security components, with recommended best practices.

Reviewing Roles and Role Assignments

How to review roles and identify the users assigned to them

Configuring Roles Using the Security Console

How to create, review, and modify roles using the Security Console, with recommended best practices

Managing Certificates and Keys

How to generate, import, export, and delete digital certificates

Security for SCM Analytics and Reports

How to manage security features that affect SCM analytics and reports

During implementation, you can perform security-related tasks from the Security Console if you have the IT Security Manager role. To use the Security Console, navigate to: Tools > Security Console.