PreviousNext JavaScript must be enabled to correctly display this content
  • Title and Copyright Information
  • Get Help
  • 1 An Introduction to Student Management Security in the Cloud
    • Overview of Securing Oracle Student Management Cloud
    • Role-Based Application Security
    • Predefined Student Management Roles
    • Role Types
    • Role Inheritance
    • Duty Role Components
    • Options for Reviewing Predefined Roles
    • Overview of Security Configuration
    • Overview of Security Console
  • 2 Implementation Users Management
    • About Implementation Users in Student Management
    • About Creating Implementation Users for Student Management
    • Get User Sign-in Sign-out Information
    • Synchronize User and Role Information
    • Import Users and Roles into Applications Security
    • Create the Technical Implementation User
    • Create the Functional Implementation User
    • Guidance for Assigning Predefined Roles
    • Assign Roles to an Existing User
  • 3 Applications Security Setup
    • Configure the Security Console
    • Default User-Name Formats
    • Password Policy
    • Configure a Custom Password Policy
    • Role Preferences
    • Create Notification Templates
    • Schedule the Import User and Role Application Security Data Process
    • Schedule the Import User Login History Process
    • Why You Run the Send Pending LDAP Requests Process
    • Retrieve Latest LDAP Changes
    • Schedule the Send Pending LDAP Requests Process
  • 4 Application Users Setup
    • Overview
    • User and Role-Provisioning Setup Options
    • User Account Creation Option
    • User Account Role Provisioning Option
    • User Account Maintenance Option
    • Set the User and Role Provisioning Options
    • Provision Abstract Roles to Users Automatically
    • Redirect Self-service Users to the Home Page Automatically
  • 5 Application Users Management
    • Create Users
      • Options for Creating Application Users
      • Create Users
      • Create Managed Student Groups
      • Enable Group Owner Change Notification
      • Inactive Users Report
    • FAQs for Creating Users
      • How can I create a user?
      • Where do default user names come from?
    • Manage Users
      • Implementation Users
      • Overview of ERP Implementation Users
      • User Accounts
      • User Account Details
      • Add User Accounts
      • Reset Passwords
      • Password Expiry Report
      • View Locked Users and Unlock Users
      • Delete User Accounts
      • User Names
    • FAQs for Application Users Management
      • What happens when I autoprovision roles for a user?
      • Why did some roles appear automatically?
      • Why is the user losing roles automatically?
      • Why can't I see the roles that I want to assign to a user?
      • What happens if I deprovision a role from a user?
      • What happens if I edit a user name?
      • What happens if I send the user name and password?
      • What happens if I reset a user's password?
      • How can I notify users of their user names and passwords?
  • 6 Role Provisioning for Application Users
    • Role Mappings
    • Create a Role Mapping
    • Role Provisioning and Deprovisioning
    • Autoprovisioning
    • Map a Party Usage Name to a Role
    • When do Edits to Role Mappings Take Effect
    • Manage Roles in Custom OAuth Client Applications Using Application Extensions Page
    • FAQs for Role Provisioning for Application Users
      • What's a role-mapping condition?
      • What's an associated role in a role mapping?
      • What's the provisioning method?
      • How do I provision roles to users?
      • Why can't a user access a task?
  • 7 Role-Based Access for Student Management
    • Overview of Role-Based Access to Data and Pages
    • Control Page Access by Role
    • Control Data Access by Role
    • Create and Manage Role Groups
    • Create and Manage Page Groups
    • Assign Data Privileges
  • 8 Location-Based Access
    • Overview
    • How Location-Based Access Works
    • Enable and Disable Location-Based Access
    • FAQs for Location-Based Access
      • What is allowlisting?
      • Why can't I see the Location Based Access tab on the Administration page?
      • How can I make a role public?
      • How can I ensure that I always have access to the Security Console?
      • How can I disable Location-based Access when I am not signed in to the application?
      • How can I disable Location-based Access when I am locked out of the application?
  • 9 Single Sign-On
    • Oracle Applications Cloud as the Single Sign-On (SSO) Service Provider
    • Configure Single Sign-On
    • Enable Multifactor Authentication
    • FAQs for Single Sign-On
      • Does the service provider store user passwords?
      • Can I set up an identity provider without enabling it?
      • How can I allow my users to sign in using their company's credentials?
      • What should I do to extend the validity of certificates provided by the identity provider?
      • How can the identity provider obtain renewed certificates from the service provider?
      • How can I disable Single Sign-On when I am not signed in to the application?
      • How can I disable Single Sign-On when I am locked out of the application?
      • What are the different events and notifications associated with the Single Sign-On functionality?
      • How to access SSO Federation logs for identity providers?
  • 10 Export and Import of Security Data and Role Hierarchy
    • Export and Import of Security Console Data
    • Export and Import of HCM Custom Roles and Security Profiles
    • Export and Import of Page and Data Access Configuration
  • 11 API Authentication
    • Configure Outbound API Authentication Using JWT Custom Claims
    • Configure Outbound API Authentication Using Three Legged OAuth Authorization Protocol
      • Enable OAuth Three-Legged Authentication for Creating External Client Application
    • Configure Inbound Authentication
    • Is there a recommended format for the public certificate?
  • 12 Reports for Application Users and Roles
    • Run the User Details System Extract Report
    • User Details System Extract Report Parameters
    • User Details System Extract Report
    • LDAP Request Information Reports
    • Inactive Users Report
    • User Role Membership Report
    • User and Role Access Audit Report
    • User Password Changes Audit Report
    • View Locked Users and Unlock Users
    • View Role Information Using Security Dashboard
    • FAQs for Reports for Application Users and Roles
      • How can I tell which roles are provisioned to a user?
  • 13 Security Console
    • Security Visualizations
    • Options for Viewing a Visualization Graph
    • Visualization Table Display Options
    • Generate a Visualization
    • Simulate Navigator Menus in the Security Console
    • Review Role Assignments
    • Review Role Hierarchies
    • Compare Roles
    • Analytics for Roles
    • Analytics for Data Resources
  • 14 Job, Abstract, and Duty Roles
    • Create Roles in the Security Console
    • Role Copying or Editing
    • Create a Custom Role with Limited Access
    • FAQs for Job, Abstract, and Duty Roles
      • How can I design roles?
      • How do I create a role hierarchy?
      • Why would I need to remove duty roles from a role hierarchy?
      • How do I create a new job role?
  • 15 Roles for Workflow Access
    • Roles That Give Workflow Administrators Access
  • 16 Certificate Management
    • Overview of Certificates
    • Types of Certificates
    • Sign a X.509 Certificate
    • Import and Export X.509 Certificates
    • Import and Export PGP Certificates
    • Delete Certificates