Detailed Course Outline
Security Overview
- Role-Based Security Model
- Predefined HCM Roles
- Role Inheritance
- Role Types
- Security Privileges
- Role Evaluation
- Customizing Security for Your Needs
Security Profiles and Data Roles
- Data Security Through Security Profiles
- HCM Security Profile Types
- Predefined HCM Security Profiles
- HCM Security Profiles Best Practices
- Key Points for Creating Security Profiles
- Creating Security Profiles and Assigning to a New Data Role
- Assigning Security Profiles to Existing Roles
- Editing Security Profiles
User Management
- User Account Creation Scenarios
- Maintaining User Accounts
- Enterprise-Level User-Management Options
- Managing Applications Security Preferences
- Implementation Users
- Reporting on Users
Role Provisioning
- Provisioning Roles to Users: Overview
- Defining Role-Provisioning Rules
- Role Mappings in Detail
- Autoprovisioning
- Role-Provisioning Rules for Abstract Roles
- Integration with the New Hire Flow
- Role-Provisioning Strategies
- Role Delegation
HCM Security Management Data Stores, Tools, Tasks, and Processes
- HCM Security Management Data Stores
- HCM Security Tasks
- Synchronization Processes and Preferences
- HCM Security Processes
- The Security Console
Using the Security Console
- Security Console: Overview and Benefits
- Running the Import User and Role Application Security Data Process
- Launching the Security Console
- Using Key Features of the Security Console
- Role Visualization
- Role Comparison
- Security Console Administration Options
Creating Custom Roles on the Security Console
- Creating Custom Job and Abstract Roles
- Copying Application Roles
- Transaction Analysis Duty Roles
- Editing Copied Roles
- Creating Roles from Scratch
- Regenerating Data Roles
HCM Security Deep Dive
- Aggregate Privileges and Duty Roles In Detail
- Function Security Privileges
- Data Security Policy Components
- Data Security - Application Role Creation
- Data Security - FND_GRANTS Generation
- Data Security - Data Role Creation
- Data Security in Action
- Creating a Custom Duty Role
Tips for Implementing HCM Security
- Resilience to Change
- Impersonation
- Minimizing the Number of Data Roles Using Areas of Responsibility
- Defining Areas of Responsibility
- Securing Persons Using Custom Criteria
- Role Optimization
Security and HCM Reporting
- OTBI Security
- BI Publisher Security