Oracle HCM Cloud: Security (D88709) – Outline

Detailed Course Outline

Security Overview
  • Role-Based Security Model
  • Predefined HCM Roles
  • Role Inheritance
  • Role Types
  • Security Privileges
  • Role Evaluation
  • Customizing Security for Your Needs
Security Profiles and Data Roles
  • Data Security Through Security Profiles
  • HCM Security Profile Types
  • Predefined HCM Security Profiles
  • HCM Security Profiles Best Practices
  • Key Points for Creating Security Profiles
  • Creating Security Profiles and Assigning to a New Data Role
  • Assigning Security Profiles to Existing Roles
  • Editing Security Profiles
User Management
  • User Account Creation Scenarios
  • Maintaining User Accounts
  • Enterprise-Level User-Management Options
  • Managing Applications Security Preferences
  • Implementation Users
  • Reporting on Users
Role Provisioning
  • Provisioning Roles to Users: Overview
  • Defining Role-Provisioning Rules
  • Role Mappings in Detail
  • Autoprovisioning
  • Role-Provisioning Rules for Abstract Roles
  • Integration with the New Hire Flow
  • Role-Provisioning Strategies
  • Role Delegation
HCM Security Management Data Stores, Tools, Tasks, and Processes
  • HCM Security Management Data Stores
  • HCM Security Tasks
  • Synchronization Processes and Preferences
  • HCM Security Processes
  • The Security Console
Using the Security Console
  • Security Console: Overview and Benefits
  • Running the Import User and Role Application Security Data Process
  • Launching the Security Console
  • Using Key Features of the Security Console
  • Role Visualization
  • Role Comparison
  • Security Console Administration Options
Creating Custom Roles on the Security Console
  • Creating Custom Job and Abstract Roles
  • Copying Application Roles
  • Transaction Analysis Duty Roles
  • Editing Copied Roles
  • Creating Roles from Scratch
  • Regenerating Data Roles
HCM Security Deep Dive
  • Aggregate Privileges and Duty Roles In Detail
  • Function Security Privileges
  • Data Security Policy Components
  • Data Security - Application Role Creation
  • Data Security - FND_GRANTS Generation
  • Data Security - Data Role Creation
  • Data Security in Action
  • Creating a Custom Duty Role
Tips for Implementing HCM Security
  • Resilience to Change
  • Impersonation
  • Minimizing the Number of Data Roles Using Areas of Responsibility
  • Defining Areas of Responsibility
  • Securing Persons Using Custom Criteria
  • Role Optimization
Security and HCM Reporting
  • OTBI Security
  • BI Publisher Security