This Oracle Financials Security Training will teach you about the Fusion Financial role-based security model. Our expert instructors will help you gain hands-on experience with the UIs used to manage security in Fusion Financials. This course is relevant for any customers using Fusion Applications through Release 11.1.7 This course is appropriate for both Oracle Cloud and on-premises deployments.By taking this course, you'll learn how to plan and implement security in Fusion Financial. Our expert instructors will help you explore how Financial security works with Oracle's BI Reporting tools.
Preview
By the end of this training you will Learn To:
- The abstract and job roles for an offering in Fusion Applications
- Duty roles and the role hierarchy for each job role and abstract role
- Privileges required to perform each duty defined by a duty role in Fusion Apps
- Data security policies for each job role, abstract role, and data role in Fusion Financials
- Policies that protect personally identifiable information
- Data security policies on fact and dimension to ensure enforcement across tools and nd access methods
- Segregation of duties policies respected in the design of duties for the job role
- Segregation of duties conflicts in some job role definitions
- Templates for generating data roles and data security policies defined for those data roles
Course Contents
Day 1
Security Overview
Role-Based Security Model
Predefined Financial Roles
Role Inheritance
Role Types
Security Privileges
Security Component Terminology Comparison
Role Evaluation
Customizing Security for Your Needs
User Management
User Account Creation Scenarios
Maintaining User Accounts
Enterprise-Level User-Management Options
Implementation Users
Reporting on Users
Creating Employee user and Procurement Agent
Role Provisioning
Provisioning Roles to Users: Overview
Defining Role-Provisioning Rules
Role Mappings in Detail
Auto provisioning
Role-Provisioning Rules for Abstract Roles
Role-Provisioning Strategies
Role Delegation
Day 2
Financials Security Management Data Stores, Tools, Tasks and Processes
Oracle Fusion Middleware: Overview
Fusion Applications, OIM, and APM Terminology Differences
Job and Abstract Roles in APM
The Security Console
Accessing OIM and APM
Single Sign-On
What is Single Sign-On?
Single Sign-On Components
How Single Sign-On Works
Technical View
Single Sign-On Terminology
Single Sign-On Patterns
Implementation Scenarios
Using the Security Console
Security Console: Overview and Benefits
Running the Import User and Role Application Security Data Process
Launching the Security Console
Using Key Features of the Security Console
Role Visualization
Role Comparison
Day 3
Creating Custom Roles on the Security Console
External Roles and Application Roles
Copying Application Roles
Reviewing Roles in All Application Stripes
Creating External Roles for Copied Application Roles
Editing Copied Roles
Creating Roles from Scratch
Running Retrieve Latest LDAP Changes
Regenerating Data Roles
Financial Security Deep Dive
Aggregate Privileges and Duty Roles In Detail
Function Security Privileges
Data Security Policy Components
Data Security - Application Role Creation
Data Security - FND_GRANTS Generation
Data Security - Data Role Creation
Data Security in Action
Creating a Custom Duty Role
Tips for Implementing Financial Security
Resilience to Change
Impersonation
Minimizing the Number of Data Roles Using Areas of Responsibility
Defining a Dynamic Data Role
Role Optimization
Data Access Security Feature in R12
Security and Financials Reporting
OTBI Security
BI Publisher Security