Who should attend
- Configuration Implementer
- Business Analysts
- Security Administrators
- Security Compliance Professionals
- Security Compliance Auditors
- Administrator
- Configuration Consultant
- Process Developer
Course Objectives
- Describe how roles are implemented and used in Human Capital Management
- Describe how roles are implemented and used in Financials
- Describe how roles are implemented and used in Oracle Sales Cloud
- Identify how security is implemented in the Oracle Cloud Applications
- Name the required Oracle components used in the Fusion Applications Security Model
- Understand what identify and access management means
- Understand how identity and access management is implemented
- Identify how the Functional Set Up Manager is used in the security model
- List the differences between implementation and functional users
- Locate the steps necessary to configure offerings and prepare for Enterprise Set Up
- Identify what Enterprise Set Up is and how to prepare for the set up
- List the different types of roles used in the security implementation for Fusion Applications
- Describe the role hierarchy and describe the components used to create one
- Name the common security elements used by all offerings in the Fusion Applications
Course Content
Security Overview
- Identifying Required Installation Security Components
- Understanding the Functions Done by each Component
Understanding Identity and Access Management
- Describing the Identity and Access Management Infrastructure
- Describing Role Based Access Control
- Learning How Oracle Identity Management is Used
- Understanding Oracle Access Manager
- Learning How Oracle Access Manager Processes Requests
Functional Set Up Manager
- Learning What Functional Set Up Manager Is
- Understanding the User Types in Fusion Applications
- Learning How to Create Users
- Understanding Configuration Projects
- Describing Set Up Data Export and Import
Demonstrating Enterprise Set Up
- Learning to Specify Enterprise Set Up Requirements
- Seeing the Oracle Learning Environment Enterprise
Functional User Role Types and Provisioning
- Defining the Five Role Types
- Defining Role Inheritance Hierarch
- Understanding What Role Mapping Is
Role Provisioning to User
- Creating and Maintaining User Accounts
- Understanding the New Hire Process
- Understanding the HCM Role Provisioning Steps
- Understanding the FSCM Role Provisioning Steps
- Understanding the Sales Cloud Role Provisioning Steps
Understanding the Security Console
- Learning What the Security Console Is
- Demonstrating Security Console Capabilities