You are on page 1of 5

Oracle Cloud Documentation

Oracle Applications Cloud


View Security Reports and Analyses
Release 13

Document Overview
The next tab of this workbook, Reports and Analyses, provides details for all of the security
reports and analyses for Cloud applications, each of which you can modify to meet your
company's requirements. Whatever role you play in your organization, there are reports
and analyses designed to help make your job easier.
Oracle Applications Cloud
Security Reports and Analyses
Release 13
The table in the following rows provides details for all of the
security reports and analyses for Cloud applications. The first cell
of the row of column headings is named ColumnTitle. The column
headings row and the first column are frozen.

Availability -
Initial
Name Release Type

Count Roles by Role Category by Data Security Policy 13.19D Analysis


Count Roles by Role Category by User 13.19D Analysis
Data Security Policy Details 13.19D Analysis
Directly Assigned Data Security Policies 13.19D Analysis
Directly Assigned Function Security Policy Details 13.19D Analysis
Directly Assigned Roles 13.19D Analysis
Directly Assigned User Details 13.19D Analysis
Function Security Policy Resource Details 13.19D Analysis
Inherited Role Hierarchy 13.19D Analysis
Inherited Role List 13.19D Analysis
Number of Roles by Role Category 13.19D Analysis
Number of Roles by Role Category by Function Security Policy 13.19D Analysis
Role Counts 13.19D Analysis
Role List by Category 13.19D Analysis
Role List by Category for Overview 13.19D Analysis
Role List by Data Security Policy 13.19D Analysis
Role List by Function Security Policy 13.19D Analysis
Role List by User 13.19D Analysis
Data Security Policy Information 13.19D Dashboard Page
Directly Assigned Data Security Policies 13.19D Dashboard Page
Directly Assigned Function Security Policies 13.19D Dashboard Page
Directly Assigned Roles 13.19D Dashboard Page
Directly Assigned Users 13.19D Dashboard Page
Function Security Policy Information 13.19D Dashboard Page
Inherited Role Hierarchy 13.19D Dashboard Page
Inherited Role List 13.19D Dashboard Page
Role Category Overview 13.19D Dashboard Page
Role Overview 13.19D Dashboard Page
Role Overview 13.19D Dashboard Page
User Role List 13.19D Dashboard Page
The table in the preceding rows provides details for all of the
security reports and analyses.
Catalog Location

/Security/Transaction Analysis Samples/Report Components


/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Report Components
/Security/Transaction Analysis Samples/Security Dashboard
/Security/Transaction Analysis Samples/Role Dashboard
/Security/Transaction Analysis Samples/Role Dashboard
/Security/Transaction Analysis Samples/Role Dashboard
/Security/Transaction Analysis Samples/Role Dashboard
/Security/Transaction Analysis Samples/Security Dashboard
/Security/Transaction Analysis Samples/Role Dashboard
/Security/Transaction Analysis Samples/Role Dashboard
/Security/Transaction Analysis Samples/Security Dashboard
/Security/Transaction Analysis Samples/Role Dashboard
/Security/Transaction Analysis Samples/Security Dashboard
/Security/Transaction Analysis Samples/Security Dashboard
Description

Dashboard analysis that shows a count of roles by role category filtered by data security policy database resource in table and
Dashboard analysis that shows a count of roles by role category filtered by user in table and pie graph views.
Dashboard analysis that shows the details of a data security policy.
Dashboard analysis that shows a list of data security policies directly assigned to a role.
Dashboard analysis that shows a list of function security policies directly assigned to a role.
Dashboard analysis that shows a list of roles directly assigned to a role.
Dashboard analysis that shows a list of users directly assigned to a role.
Dashboard analysis that shows a list of resources associated to a function security policy.
Dashboard analysis that shows the role hierarchy for a role.
Dashboard analysis that shows a list of inherited roles for a role.
Dashboard analysis that shows a count of roles by role category in table and pie graph views.
Dashboard analysis that shows a count of roles by role category filtered by function security policy in table and pie graph views
Dashboard analysis that has performance tiles showing counts of artifacts filtered for a role.
Dashboard analysis that shows a list of roles for a role category.
Dashboard analysis that shows the roles for a role category.filtered by roles in table and pie graph views.
Dashboard analysis that shows a list of roles for a data security policy database resource.
Dashboard analysis that shows a list of roles for a function security policy.
Dashboard analysis that shows a list of roles for a user.
Security Dashboard page that shows data security policy information details.
Role Dashboard page that shows the list of directly assigned data security policies.
Role Dashboard page that shows the list of directly assigned function security policies.
Role Dashboard page that shows the list of directly assigned roles.
Role Dashboard page that shows the list of directly assigned users.
Security Dashboard page that shows fuction security policy information details.
Role Dashboard page that shows the inherited role hierarchy information.
Role Dashboard page that shows the inherited role list details.
Security Dashboard page that provides an overview of role category information.
Role Dashboard page that provides an overview of role information.
Security Dashboard page that provides an overview of role information.
Security Dashboard page that shows the user role list details.
Product or
Product
Family Related Subject Area

Security Security - Roles and Privileges Real Time


Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security Security - Roles and Privileges Real Time
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security

You might also like