Overview of Oracle Cloud Applications: Security
- The participant will be able to Identify security components in Oracle Cloud Applications
- The participant will be able to Identify required security components used in Oracle Cloud Applications
- The participant will be able to Introduce the Functional Setup Manager
- The participant will be able to Introduce and provide usage details of the Security Console
- The participant will be able to Describe Enterprise setup and its importance to Cloud Applications security
- The participant will be able to Introduce Oracle bulk data loaders
- The participant will be able to Demonstrate using the Security Console for role research and customization
- The participant will be able to Provide details of the Security Console for user management
- The participant will be able to Describe the role hierarchy and how it provides application and data access
- The participant will be able to Describes the types of users supported by Oracle Cloud Applications
Duration
2 Days
Prerequisite for Oracle Cloud Applications: Security
There are no Prerequisites for this course.
Course Outline for Oracle Cloud Applications: Security
Security Overview
- Roles Based Access Control terminology
- Security implementation data flow
- Role Based Access Control Standard definition
- Functional Setup Manager introduction
- Role Inheritance Hierarchy introduction
Security Components
- Required installation components in addition to licensed offering
- Security Console introduction
- Human Capital Management Core description and requirement
- Introduce the Oracle Security Reference Model
Functional Setup Manager
- Identify user types and need
- List implementation user duties
- Describe implementation user creation and provisioning
- Describe functional user creation and provisioning
- Introduce implementation projects
Enterprise Setup
- Introduce the five types of roles supported
- Provide details on the role inheritance hierarchy
- Describe Role Provision Rules and demonstrate their use
Security Console
- Describe the data storage for the Security Console
- List the benefits and features of the Security Console
- Describe Security Console role management capabilities
- Describe Security Console user management capabilities
- Describe Security Console setup requirements
User and Role Provisioning
- Describe user account creation capabilities
- Identify role provisioning capabilities
- Identify role provisioning restrictions
- Introduce the HCM Data Loader
- Provide details on HCM Role customization
- Provide details on ERP Role customization
- Provide details on Sales Cloud Role customization