Contents

1 An Introduction to HCM Security in the Cloud

2 Creating Implementation Users

3 Creating HCM Data Roles for Implementation Users

4 Enabling Basic Data Access for Abstract Roles

5 Assigning Roles to Implementation Users

6 Setting Up Applications Security

7 Managing Location-Based Access

8 Single Sign-On

9 API Authentication

10 Export and Import of Security Setup Data

11 Preparing for Application Users

12 Creating Application Users

13 Managing Application Users

14 Provisioning Roles to Application Users

15 Reporting on Application Users and Roles

16 HCM Data Roles and Security Profiles

17 Person Security Profiles

18 Organization and Other Security Profiles

19 Using the Security Console

20 Creating and Editing Job, Abstract, and Duty Roles

21 Regenerating Roles

22 Securing Access to Value Sets

23 Securing Content Sections in Person Profiles

24 Securing Access to Succession Plans, Incumbents, and Candidates

25 Securing Access to Talent Pools

26 Securing Access to Talent Review Meetings

27 Security and the Responsive User Experience

28 Security and Reporting

29 Roles for Workflow Access

30 Auditing Oracle HCM Cloud Business Objects

31 Certificate Management

32 Advanced Data Security