Export and Import of HCM Custom Roles and Security Profiles
You're looking at migrating your HCM custom roles, data roles, and security profiles from one environment to another. To accomplish most of your HCM security migration needs, export the business objects in the Users and Security functional area within the Workforce Deployment offering.
Other offerings have a Users and Security functional area, but only the Workforce Deployment offering has the business objects that support migration of HCM custom roles within its Users and Security functional area.
Before You Begin
Learn how to export and import business object data. Detailed instructions are available in the Overview of Setup Data Export and Import topic of the Using Functional Setup Manager guide. Refer to the Related Topics section for the link to this topic.
What Gets Exported and Imported
When you migrate HCM roles and security profiles, the following business objects are exported in the configuration package generated from the Users and Security functional area within the Workforce Deployment offering.
-
Application Data Security
-
Application Profile Value
-
Functional Security Custom Roles
-
Functional Security Custom Role Hierarchy
-
Functional Security Custom Role Privilege Membership
-
-
HCM Data Role
-
HCM Data Role Security Profile
-
-
HCM Exclusion Role
-
HCM Exclusion Rule Detail
-
-
Legislative Data Group Security Profile
-
Legislative Data Group Security Profile List
-
-
Organization Security Profile
-
Organization Security Profile Classification List
-
Organization Security Profile Organization List
-
-
Country Security Profile
-
Country Security Profile Country List
-
-
Position Security Profile
-
Position Security Profile Position List
-
Position Security Profile Area of Responsibility Scope
-
-
HR Document Type Security Profile List
-
HR Document Type Security Profile List
-
-
Payroll Security Profile
-
Payroll Security Profile Pay
-
-
Payroll Flow Security Profile
-
Payroll Flow Security Profile Pay
-
-
Payroll Element Security Profile
-
Payroll Element Security Profile Details
-
-
Person Security Profile
-
Person Security Profile Manager Type
-
Person Security Profile Area of Responsibility Scope
-
Person Security Profile Exclusion
-
- Talent Pools Security Profile
- Talent Pools Security Profile Job Family
- Talent Pools Security Profile Department
- Talent Pools Security Profile Business Unit
-
Transaction Security Profile
-
Transaction Security Profile Entries
-
Transaction Security Profile Sub Categories
-
-
Role Provisioning Rule
-
Role Provisioning Associated Role List
-
Let's closely examine each business object to know what it contains.
Business Object |
Information Included in Export and Import |
---|---|
Application Data Security |
Application data security includes data security policies that are created in the following ways:
Data security policies that are generated by the HCM Data Roles UI aren't exported as part of the application data security business object. They're automatically created on the target environment when you import the HCM Data Role business object. Data security conditions that are generated from HCM security profiles aren't exported as part of the Application Data security business object. They're automatically created on the target environment when the HCM security profile business objects are imported. Note:
There's no scope support for application data security policies. When you export application data security policies all data security policies are exported, even if you provided a scope value for other security business objects in your configuration package. There's no Export to CSV option for this business object. |
Application Profile Value |
Application profile value includes the profile values for the PER_MASTER_WORK_EMAIL profile. This profile option is no longer used and no values are exported for this business object. |
Functional Security Custom Roles |
The custom role includes the following details:
Note:
The scope is limited to User Assignable roles only. |
Functional Security Custom Role Hierarchy |
The role hierarchy includes the following details:
|
Functional Security Custom Role Privilege Membership |
The role privilege membership includes the following details:
|
HCM Data Role |
The HCM data role includes the following details:
|
HCM Data Role Security Profile |
The HCM data role security profile includes the following details:
|
HCM Exclusion Rule |
HCM exclusion rule and HCM exclusion rule detail includes HCM exclusion rule definitions.
|
Legislative Data Group Security Profile List |
Legislative data group security profile list includes the following details:
|
Organization Security Profile |
Organization security profile includes the following details:
|
Organization Security Profile Classification List |
Organization security profile classification list includes the following details:
|
Organization Security Profile Organization List |
Organization security profile organization list includes the following details:
|
Country Security Profile |
Country security profile includes the following details:
|
Country Security Profile List |
Country security profile list includes the following details:
|
Position Security Profile |
Position security profile includes the following details:
|
Position Security Profile Position List |
Position security profile position list includes the following details:
|
Position Security Profile Area of Responsibility Scope |
Position security profile area of responsibility scope includes the following details:
|
HR Document Type Security Profile |
HR document type security profile includes the following details:
|
HR Document Type Security Profile List |
HR document type security profile list includes the following details:
|
Payroll Security Profile |
Payroll security profile includes the following details:
|
Payroll Security Profile Pay |
Payroll security profile pay includes the following details:
|
Payroll Flow Security Profile |
Payroll flow security profile includes the following details:
|
Payroll Flow Security Profile Pay |
Payroll flow security profile pay includes the following details:
|
Payroll Element Security Profile |
Payroll element security profile includes the following details:
|
Payroll Element Security Profile Details |
Payroll element security profile details includes the following details:
|
Person Security Profile |
Person security profile includes the following details:
|
Person Security Profile Manager Type |
Person security profile manager type includes the following details:
|
Person Security Profile Area of Responsibility Scope |
Person security profile area of responsibility scope includes the following details:
|
Person Security Profile Exclusion |
Person security profile exclusion includes the following details:
|
Talent Pools Security Profile |
Talent pools security profile includes the following details:
|
Talent Pools Security Profile Job Family |
Talent pools security profile job family includes the following details:
|
Talent Pools Security Profile Department |
Talent pools security profile department includes the following details:
|
Talent Pools Security Profile Business Unit |
Talent pools security profile business unit includes the following details:
|
Transaction Security Profile |
Transaction security profile includes the following details:
|
Transaction Security Profile Entries |
Transaction security profile entries include the following details:
|
Transaction Security Profile Sub Categories |
Transaction security profile sub categories include the following details:
|
Role Provisioning Rule |
Role provisioning rule includes the following details:
|
Role Provisioning Associated Role List |
Role provisioning associated role list includes the following details:
|
Other business objects that you might like to export when migrating HCM custom roles are:
-
Job Requisition Security Profile
-
Spreadsheet Business Object Security Mapping
Let's closely examine each of these business objects to know what they contain.
Business Object |
Information Included in Export and Import |
---|---|
Job Requisition Security Profile |
Job requisition security profile includes the following details:
|
Spreadsheet Business Object Security Mapping |
HCM spreadsheet business object access mapping includes the following details:
|
You can migrate job requisition security profiles by exporting the business objects in the Users and Security functional area within the Recruiting and Candidate Experience offering. You should do this before migrating the business objects in the Users and Security functional area within the Workforce Deployment offering. You must have the Recruiting Administrator role to export and import job requisition security profiles.
You can migrate HCM spreadsheet business object access mappings by exporting the business objects in the HCM Data Loader functional area within the Workforce Deployment offering. You should do this after migrating the business objects in the Users and Security functional area. You must have the Human Capital Management Integration Specialist role to export and import HCM spreadsheet business object access mappings.
After the Import Completes
You might need to wait for a period of time before all of the migrated data security policies are visible in the security console after completing the import of the configuration package that's generated from the Users and Security functional area within the Workforce Deployment.
When application data security policies are imported, a process runs in the background to synchronize the imported data security policies with the roles on the target environment. The imported data security policies aren't active until this process has completed, at which point the data security policies will be visible in the security console. This affects data security policies for custom roles that have been copied from other roles in the source environment. It also affects custom roles that have data security policies that were added manually using the security console.
No manual regeneration processes are needed on the target environment; the import process triggers the role regeneration process. This only applies if you're importing the HCM Data Role business object.
What's Not Included
Data security policies that have been manually created from the security console, and which reference conditions that have been generated from an HCM security profile, must be manually recreated on the target environment. You must import the condition by importing the appropriate HCM security profile business object before creating these data security policies in the target environment.