Oracle Cloud Applications: Security Training

  • The participant will be able to Identify security components in Oracle Cloud Applications
  • The participant will be able to Identify required security components used in Oracle Cloud Applications
  • The participant will be able to Introduce the Functional Setup Manager
  • The participant will be able to Introduce and provide usage details of the Security Console
  • The participant will be able to Describe Enterprise setup and its importance to Cloud Applications security
  • The participant will be able to Introduce Oracle bulk data loaders
  • The participant will be able to Demonstrate using the Security Console for role research and customization
  • The participant will be able to Provide details of the Security Console for user management
  • The participant will be able to Describe the role hierarchy and how it provides application and data access
  • The participant will be able to Describes the types of users supported by Oracle Cloud Applications

2 Days

There are no Prerequisites for this course

 

  • Roles Based Access Control terminology
  • Security implementation data flow
  • Role Based Access Control Standard definition
  • Functional Setup Manager introduction
  • Role Inheritance Hierarchy introduction
  • Required installation components in addition to licensed offering
  • Security Console introduction
  • Human Capital Management Core description and requirement
  • Introduce the Oracle Security Reference Model
  • Identify user types and need
  • List implementation user duties
  • Describe implementation user creation and provisioning
  • Describe functional user creation and provisioning
  • Introduce implementation projects

Role Types and Role Provisioning

  • Introduce the five types of roles supported
  • Provide details on the role inheritance hierarchy
  • Describe Role Provision Rules and demonstrate their use
  • Describe the data storage for the Security Console
  • List the benefits and features of the Security Console
  • Describe Security Console role management capabilities
  • Describe Security Console user management capabilities
  • Describe Security Console setup requirements
  • Describe user account creation capabilities
  • Identify role provisioning capabilities
  • Identify role provisioning restrictions
  • Introduce the HCM Data Loader
  • Provide details on HCM Role customization
  • Provide details on ERP Role customization
  • Provide details on Sales Cloud Role customization