Login
Register

Home

Trainings

Fusion

R12

Blogs

Contact Us

  • Register

Search Courses

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 

This Oracle Financials Security Training will teach you about the Fusion Financial role-based security model. Our expert instructors will help you gain hands-on experience with the UIs used to manage security in Fusion Financials. This course is relevant for any customers using Fusion Applications through Release 11.1.7 This course is appropriate for both Oracle Cloud and on-premises deployments.By taking this course, you'll learn how to plan and implement security in Fusion Financial. Our expert instructors will help you explore how Financial security works with Oracle's BI Reporting tools. 

 

Preview

By the end of this training you will Learn To:

  • The abstract and job roles for an offering in Fusion Applications
  • Duty roles and the role hierarchy for each job role and abstract role
  • Privileges required to perform each duty defined by a duty role in Fusion Apps
  • Data security policies for each job role, abstract role, and data role in Fusion Financials
  • Policies that protect personally identifiable information
  • Data security policies on fact and dimension to ensure enforcement across tools and nd access methods
  • Segregation of duties policies respected in the design of duties for the job role
  • Segregation of duties conflicts in some job role definitions
  • Templates for generating data roles and data security policies defined for those data roles

 


Course Contents

Day 1

Security Overview

Role-Based Security Model
Predefined Financial Roles

Role Inheritance

Role Types

Security Privileges

Security Component Terminology Comparison

Role Evaluation

Customizing Security for Your Needs

 

User Management

User Account Creation Scenarios

Maintaining User Accounts

Enterprise-Level User-Management Options

Implementation Users

Reporting on Users

Creating Employee user and Procurement Agent

 

Role Provisioning

Provisioning Roles to Users: Overview

Defining Role-Provisioning Rules

Role Mappings in Detail

Auto provisioning

Role-Provisioning Rules for Abstract Roles

Role-Provisioning Strategies

Role Delegation

 

Day 2

Financials Security Management Data Stores, Tools, Tasks and Processes

Oracle Fusion Middleware: Overview

Fusion Applications, OIM, and APM Terminology Differences

Job and Abstract Roles in APM

The Security Console

Accessing OIM and APM


Single Sign-On

What is Single Sign-On?

Single Sign-On Components

How Single Sign-On Works

Technical View

Single Sign-On Terminology

Single Sign-On Patterns

Implementation Scenarios

 

Using the Security Console 

Security Console: Overview and Benefits

Running the Import User and Role Application Security Data Process

Launching the Security Console

Using Key Features of the Security Console

Role Visualization

Role Comparison

 

Day 3

Creating Custom Roles on the Security Console

External Roles and Application Roles

Copying Application Roles

Reviewing Roles in All Application Stripes

Creating External Roles for Copied Application Roles

Editing Copied Roles

Creating Roles from Scratch

Running Retrieve Latest LDAP Changes

Regenerating Data Roles

 

Financial Security Deep Dive

Aggregate Privileges and Duty Roles In Detail

Function Security Privileges

Data Security Policy Components

Data Security - Application Role Creation

Data Security - FND_GRANTS Generation

Data Security - Data Role Creation

Data Security in Action

Creating a Custom Duty Role

 

Tips for Implementing Financial Security

Resilience to Change

Impersonation

Minimizing the Number of Data Roles Using Areas of Responsibility

Defining a Dynamic Data Role

Role Optimization

Data Access Security Feature in R12

 

Security and Financials Reporting

OTBI Security

BI Publisher Security




Enroll

 
 
 
 
 



Training Hours

Start Date: 

Schedule: 

Timing: 12:00 NOON GMT | 08:00AM EST | 5:00AM PST | 7:00AM CST | 6:00AM MST | 5:30PM IST  | 01:00PM GMT+1

Audience

  • Functional Implementer
  • Implementation Consultant
  • Security Administrators


{jcomments off}

 

 


Apps2Fusion

About the Author

Apps2Fusion

Overall Rating (0)

0 out of 5 stars
  • No comments found

Search Trainings

Fully verifiable testimonials

Apps2Fusion - Event List

<<  May 2017  >>
 Mon  Tue  Wed  Thu  Fri  Sat  Sun 
  1  2  3  4  5  6  7
  8  9101112
    

Enquire For Training

Fusion Training Packages

Get Email Updates


Powered by Google FeedBurner