Overview of Security Configuration

This chapter describes some of the ways in which you can configure the predefined sales security model.

The Oracle implementation of role-based access control is designed to handle a wide range of security requirements in different environments. As a result, most companies can use the standard security settings without modification. If necessary, though, you can configure the default settings to meet specific business requirements. Before making any changes to the security reference implementation, make sure you follow these steps:

  • Clearly define the change that's required and review the proposed changes with Oracle Support.

  • Make sure you understand the interrelationships of the various security components and the effect of the proposed change on user access.

  • Document any changes you make.

This chapter describes how you can create your own roles and role hierarchies. For information about configuring data security, see the chapter Configure and Troubleshoot Data Security.

For additional information about changing the standard security settings, go to the Security Resource Center, which is available at 1609084.1 (Document ID) on My Oracle Support. The Security Resource Center provides templates you can use to track the changes you make to standard settings. For information about the privileges or other security artifacts provided for new or updated functionality in each release, and the procedures to add these privileges to custom roles, see the Upgrade Guide for Oracle Sales Cloud Application Security article (Document ID 1989500.1) on My Oracle Support.