You are on page 1of 22

Oracle Fusion

Security Concepts
8
Day 1
Contents
 Oracle Fusion Security Concepts using examples

2
We make experts - http://apps2fusion.com
FUSION HCM OVERVIEW

We make experts - http://apps2fusion.com 3


Job Posting and Job Definition Screen

We make experts - http://apps2fusion.com 4


Meet Doris

We make experts - http://apps2fusion.com 5


Doris is Hired

We make experts - http://apps2fusion.com 6


What Doris Can do and View

We make experts - http://apps2fusion.com 7


Doris starts using Oracle Fusion
applications

We make experts - http://apps2fusion.com 8


What is Role based Security

We make experts - http://apps2fusion.com 9


Who is Doris assigned a set of Roles

We make experts - http://apps2fusion.com 10


What is Duties/Privileges under the Roles

We make experts - http://apps2fusion.com 11


What determines -> Menu Items

We make experts - http://apps2fusion.com 12


What determines->Tasks

We make experts - http://apps2fusion.com 13


Which is Data Security determines->On
screen

We make experts - http://apps2fusion.com 14


Data Role
 Job Role is like a cookie Cutter to generate data roles

We make experts - http://apps2fusion.com 15


Job Role VS Data Role
 If Job role has access to the “Loaf” of bread , it’s generated data roles
have access to “One Slice”

We make experts - http://apps2fusion.com 16


Job Role Vs Data Role
Example of Job Role
Procurement Manager is a Job role
Example of Data Role
Procurement manager US is a Data Role
The slicing Criteria or dimension is an attribute of the data for that job role,
like Business unit or Set ID
Example: Purchase orders by Business Unit

We make experts - http://apps2fusion.com 17


EBS Mapping – Oracle Fusion Security

We make experts - http://apps2fusion.com 18


Terminology
 Security Reference Implementation
An complete example of implementation of security for each fusion offering
Details in Security Reference Manuals for each Product
Role
Created in Oracle Identity management
Can also create a hierarchy of these Roles
Normally data roles determine the data the user can see
Role Category
A way to classify the Roles
Example: HCM Job roles, HCM Abstract Roles, Financials Job Roles

We make experts - http://apps2fusion.com 19


Terminology
Abstract Role
Abstract is usually assigned directly – does not require data role generated
on top of it
Job Role
Roles you would hire someone into-Accounts payables manager, Billing
Clerk, etc
Usually requires a data role generated on top of it
Duty Role
This is the most granular form of role which is created and managed in
Authorization policy manager.
Privileges and data security policies are assigned to it

We make experts - http://apps2fusion.com 20


Terminology
Functional Policy
Each Policy consists of set of targets that the policy provides access to
Entitlement(Privilege or Target)
Screens , Buttons, lists
Data Security Policy
Specifies an object and what actions you can do to it
Possible actions are predefined for each business
object(Read,update,Delete,Manage)
Database Resource
Database table or groups of tables with data

We make experts - http://apps2fusion.com 21


We make experts - http://apps2fusion.com 22

You might also like