Contact Us

  • Register

Oracle Gold Partners, our very popular training packages, training schedule is listed here
Designed by Five Star Rated Oracle Press Authors & Oracle ACE's.

webinar new Click here to raise Support Ticket. Get reply within 48 hours.

Search Courses

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

This Oracle HCM Security Training will teach you about the Fusion HCM role-based security model. Our expert instructors will help you gain hands-on experience with the UIs used to manage security in Fusion HCM. This course is relevant for any customers using Fusion Applications through Release 11.1.7 This course is appropriate for both Oracle Cloud and on-premises deployments. By taking this course, you'll learn how to plan and implement security in Fusion HCM. Our expert instructors will help you explore how HCM security works with Oracle's BI Reporting tools. You'll also learn some advanced tips for implementing security, using features like Areas of Responsibility to minimize the number of data roles you need to create.



By the end of this training you will Learn To:

  • Identify and manage the different types of roles, including data, abstract, job, and duty roles
  • Create role-provisioning rules
  • Create security profiles to restrict data access.
  • Create data roles and assign security profiles to them.
  • Create implementation users.
  • Provision roles to users.
  • Create a custom job role using Oracle Identify Manager (OIM).
  • Create a custom duty role using Authorization Policy Manager (APM).


Course Contents

Day 1

Security Overview

Role-Based Security Model
Predefined HCM Roles

Role Inheritance

Role Types

Security Privileges

Security Component Terminology Comparison

Role Evaluation

Customizing Security for Your Needs


Security Profiles and Data Roles

Data Security Through Security Profiles

HCM Security Profile Types

Predefined HCM Security Profiles

HCM Security Profiles Best Practices

Key Points for Creating Security Profiles

Creating Security Profiles and Assigning to a New Data Role

Assigning Security Profiles to Existing Roles

Editing Security Profiles


User and Role Provisioning

User Account Creation and Maintenance Scenarios

User Account Provisioning

Enterprise-Level User and Role-Provisioning Options

Provisioning Roles to Users: Overview

Defining Role-Provisioning Rules

Integration with New Hire Flow

Implementation Users

Creating a New User and Assigning a Data Role


Day 2

HCM Security Management Data Stores

User Interface Overview

HCM Security Management Data Stores

Setup Tools and Tasks

Access to Security Tasks

Managing Job Roles and Abstract Roles

Regenerating Data Roles

Creating a New Job Role

Creating a New Data Role and Assigning to User


HCM Security Deep Drive

Duty Roles In Detail

Function Security Privileges

Data Security Policy Components

Data Security - Application Role Creation

Data Security - FND_GRANTS Generation

Data Security - Data Role Creation

Data Security in Action

Viewing Security Policies


Using Security Console

User Management / General Administration


Day 3

Managing Duty Roles

Creating a Custom Duty Role


Tips for Implementing HCM Security

Resilience to Change

Impersonation and Delegation

Advanced Tip: Minimizing the Number of Data Roles

Defining a Dynamic Data Role


Security and HCM Reporting

OTBI Security

BI Publisher Security



Training Hours

Start Date: 16th September 2017

Schedule: 16, 17 & 23 September 2017

Timing: 12:00 NOON GMT | 08:00AM EST | 5:00AM PST | 7:00AM CST | 6:00AM MST | 5:30PM IST  | 01:00PM GMT+1


  • Functional Implementer
  • Implementation Consultant
  • Security Administrators

{jcomments off}



About the Author


Overall Rating (0)

0 out of 5 stars
  • No comments found

Search Trainings

Fully verifiable testimonials

Apps2Fusion - Event List

<<  Oct 2017  >>
 Mon  Tue  Wed  Thu  Fri  Sat  Sun 

Enquire For Training

Fusion Training Packages

Get Email Updates

Powered by Google FeedBurner