Overview of Securing Oracle Fusion Cloud SCM
Oracle SCM Cloud is secure as delivered. This guide explains how to enable user access to SCM functions and data. You perform some of the tasks in this guide either only or mainly during implementation. Most, however, can also be performed later and as
As of Release 12, data roles are no longer used in Oracle SCM Cloud. Assume that references in this guide to data roles are only applicable to Oracle HCM Cloud. For important background, details, and instructions, see the Oracle ERP Cloud and Oracle SCM Cloud Security Upgrade Guide (2211555.1) on My Oracle Support at https://support.oracle.com.
Guide Structure
The following table describes the contents of each chapter in this guide.
Chapter |
Contents |
---|---|
Introduction |
A brief introduction to the concepts of role-based security |
Using the Security Console |
How to set up and manage the centralized security work area |
Managing Implementation Users |
The purpose of implementation users and how you create them |
Preparing for Application Users |
Enterprise-wide options and related decisions that affect application users |
Creating and Managing Application Users |
The different ways you can create application users and maintain user accounts, with instructions for some methods |
Provisioning Roles to Application Users |
The ways that application users can acquire roles, with instructions for creating some standard role mappings |
Configuring Security |
How to create, review, and modify security components, with recommended best practices. |
Reviewing Roles and Role Assignments |
How to review roles and identify the users assigned to them |
Configuring Roles Using the Security Console |
How to create, review, and modify roles using the Security Console, with recommended best practices |
Managing Certificates and Keys |
How to generate, import, export, and delete digital certificates |
Security for SCM Analytics and Reports |
How to manage security features that affect SCM analytics and reports |
During implementation, you can perform security-related tasks from the Security Console if you have the IT Security Manager role. To use the Security Console, navigate to: Tools > Security Console.