Oracle Cloud Applications: Security Training

The participant will be able to Identify security components in Oracle Cloud Applications. The participant will be able to Identify required security components used in Oracle Cloud Applications. The participant…

Created by

Stalwart Learning

Category

Date & Time

Price

Duration

2 Days

Location

https://stalwartlearning.com

ENQUIRE NOW


Course Description

Overview of Oracle Cloud Applications: Security

  • The participant will be able to Identify security components in Oracle Cloud Applications
  • The participant will be able to Identify required security components used in Oracle Cloud Applications
  • The participant will be able to Introduce the Functional Setup Manager
  • The participant will be able to Introduce and provide usage details of the Security Console
  • The participant will be able to Describe Enterprise setup and its importance to Cloud Applications security
  • The participant will be able to Introduce Oracle bulk data loaders
  • The participant will be able to Demonstrate using the Security Console for role research and customization
  • The participant will be able to Provide details of the Security Console for user management
  • The participant will be able to Describe the role hierarchy and how it provides application and data access
  • The participant will be able to Describes the types of users supported by Oracle Cloud Applications

Duration

2 Days

Prerequisite for Oracle Cloud Applications: Security

There are no Prerequisites for this course.

Course Outline for Oracle Cloud Applications: Security

Security Overview
  • Roles Based Access Control terminology
  • Security implementation data flow
  • Role Based Access Control Standard definition
  • Functional Setup Manager introduction
  • Role Inheritance Hierarchy introduction
Security Components
  • Required installation components in addition to licensed offering
  • Security Console introduction
  • Human Capital Management Core description and requirement
  • Introduce the Oracle Security Reference Model
Functional Setup Manager
  • Identify user types and need
  • List implementation user duties
  • Describe implementation user creation and provisioning
  • Describe functional user creation and provisioning
  • Introduce implementation projects
Enterprise Setup
  • Introduce the five types of roles supported
  • Provide details on the role inheritance hierarchy
  • Describe Role Provision Rules and demonstrate their use
Security Console
  • Describe the data storage for the Security Console
  • List the benefits and features of the Security Console
  • Describe Security Console role management capabilities
  • Describe Security Console user management capabilities
  • Describe Security Console setup requirements
User and Role Provisioning
  • Describe user account creation capabilities
  • Identify role provisioning capabilities
  • Identify role provisioning restrictions
  • Introduce the HCM Data Loader
  • Provide details on HCM Role customization
  • Provide details on ERP Role customization
  • Provide details on Sales Cloud Role customization

ENQUIRE NOW