SlideShare a Scribd company logo
1 of 15
ORACLE CLOUD
SECURITY
By Amit Bhatnagar
Contents
◦ Security in ERP
◦ Common ERP Vulnerabilities
◦ Core Security Pillars
◦ Security in Oracle Cloud
◦ Oracle Cloud ERP Roles
◦ Function & Data Security Policies
◦ Setup Process in Oracle Cloud
◦ Creating Users
◦ Creating Custom Roles
◦ Extra Bytes
◦ Q&A?
Security in ERP
• ERP Security is a wide range of measures aimed at protecting Enterprise resource planning (ERP)
systems from illicit access ensuring accessibility and integrity of system data
• ERP system serves to unify the information intended to manage the organization
• The Advantage of having ERP is that it provides data consistency and all in one solution
Common ERP Vulnerabilities
• Access Control
• Inadequate Training
• Failure to Comply
• Unsecure Integration
• Data Encryption and Masking issues
• Complex Solutions
Core Security Pillars
• Data Encryption
• Security Controls
• Visibility
• Hybrid Cloud
• High Availability
Security in Oracle Cloud
Oracle Cloud ERP Roles
Oracle ERP Cloud uses 3 types of roles:
Job Roles
Represent jobs that users perform in an organization, e.g. General Accountant, Accounts
Payable Manager
Can be assigned to users
Abstract Roles
Represent people in the organization independent of the jobs they perform, e.g. Employee,
Line Manager
Can be assigned to users
Duty Roles
Logical collection of privileges that grant access to tasks that someone performs as part of a
job
Not assignable to users directly
Function & Data Security Policies
• Function Security Policies are defined via function security privileges
• Each function security privilege secures the code resources that make up the relevant pages, page
components (like tabs and buttons) and scheduled jobs
• Data Security Policy defines access by a role, to a business object, with a condition and for an action
(data security privilege)
• Aggregate Privilege combines function security privileges with related data security policies
Setup Process in Oracle Cloud
Data Access Set
Access Set Type Access Level
Full Ledger
Primary
Balancing
Segment
Read Only Read and
Write
Implementing Security In Oracle Cloud
• Create a User
• Assign roles
• Assign Security context to the user through Data Access Set
Creating a User
Use the Create User task to create users if Human Capital Management (HCM)
is NOT being implemented. Create User task creates a minimal person record
and a user account
If HCM is being implemented, use the Hire an Employee task to create users
instead. Hire an Employee task creates the full person record needed by HCM
as well as the user account
Use the Security Console to create implementation only users. Implementation
users are user accounts without the associated person record.
Creating a Custom Role
Managing Data Access
◦ Use the Manage Data Access for
Users task to manage data scope
assignments
◦ Search assignments for a single
user or a single role
◦ You can further filter the search
results, or export the results to
Excel
◦ You can also authorize additional
data accesses
Extra Bytes – Data Import
◦ File based Data Import
◦ ADF Desktop Integration
Q&A
shivmohanp@cltcsi.com
amitb@cltcsi.com
sales@cltcsi.com

More Related Content

What's hot

Implementing Cloud Financials
Implementing Cloud FinancialsImplementing Cloud Financials
Implementing Cloud FinancialsNERUG
 
Oracle Payable Complete Business flows
Oracle Payable Complete Business flowsOracle Payable Complete Business flows
Oracle Payable Complete Business flowsAdil Arshad
 
Oracle Payables R12 ivas
Oracle Payables R12 ivasOracle Payables R12 ivas
Oracle Payables R12 ivasAli Ibrahim
 
Oracle BI publisher intro
Oracle BI publisher introOracle BI publisher intro
Oracle BI publisher introAdil Arshad
 
Introduction to Oracle Financials
Introduction to Oracle FinancialsIntroduction to Oracle Financials
Introduction to Oracle Financialshasan2000
 
Rapid implementation Spreadsheets in Oracle ERP Cloud
Rapid implementation Spreadsheets in Oracle ERP CloudRapid implementation Spreadsheets in Oracle ERP Cloud
Rapid implementation Spreadsheets in Oracle ERP CloudPrithis Das, PMP, OCS ☁️
 
Introduction to Oracle Fusion BIP Reporting
Introduction to Oracle Fusion BIP ReportingIntroduction to Oracle Fusion BIP Reporting
Introduction to Oracle Fusion BIP ReportingGurpreet singh
 
5 enterprise structures
5   enterprise structures5   enterprise structures
5 enterprise structuresmohamed refaei
 
Oracle Receivables ivas
Oracle Receivables ivasOracle Receivables ivas
Oracle Receivables ivasAli Ibrahim
 
Oracle applications sla r12 SLA- demos
Oracle applications sla r12   SLA- demosOracle applications sla r12   SLA- demos
Oracle applications sla r12 SLA- demosAli Ibrahim
 
Steps on how to restrict sit s
Steps on how to restrict sit sSteps on how to restrict sit s
Steps on how to restrict sit sFeras Ahmad
 
Organization Setup in R12
Organization Setup in R12Organization Setup in R12
Organization Setup in R12eprentise
 
oracle enterprise asset management ppt
oracle enterprise asset management pptoracle enterprise asset management ppt
oracle enterprise asset management pptEjaz Hussain
 
Oracle R12 Cash Management New Features
Oracle R12 Cash Management New FeaturesOracle R12 Cash Management New Features
Oracle R12 Cash Management New FeaturesSanjay Challagundla
 

What's hot (20)

Oracle receivables
Oracle receivablesOracle receivables
Oracle receivables
 
Implementing Cloud Financials
Implementing Cloud FinancialsImplementing Cloud Financials
Implementing Cloud Financials
 
Oracle Payable Complete Business flows
Oracle Payable Complete Business flowsOracle Payable Complete Business flows
Oracle Payable Complete Business flows
 
Oracle Payables R12 ivas
Oracle Payables R12 ivasOracle Payables R12 ivas
Oracle Payables R12 ivas
 
Oracle BI publisher intro
Oracle BI publisher introOracle BI publisher intro
Oracle BI publisher intro
 
Introduction to Oracle Financials
Introduction to Oracle FinancialsIntroduction to Oracle Financials
Introduction to Oracle Financials
 
Rapid implementation Spreadsheets in Oracle ERP Cloud
Rapid implementation Spreadsheets in Oracle ERP CloudRapid implementation Spreadsheets in Oracle ERP Cloud
Rapid implementation Spreadsheets in Oracle ERP Cloud
 
Introduction to Oracle Fusion BIP Reporting
Introduction to Oracle Fusion BIP ReportingIntroduction to Oracle Fusion BIP Reporting
Introduction to Oracle Fusion BIP Reporting
 
Sla and cost acctg
Sla and cost acctgSla and cost acctg
Sla and cost acctg
 
5 enterprise structures
5   enterprise structures5   enterprise structures
5 enterprise structures
 
Oracle Receivables ivas
Oracle Receivables ivasOracle Receivables ivas
Oracle Receivables ivas
 
One time payment requests in Oracle ERP Cloud
One time payment requests in Oracle ERP CloudOne time payment requests in Oracle ERP Cloud
One time payment requests in Oracle ERP Cloud
 
Oracle applications sla r12 SLA- demos
Oracle applications sla r12   SLA- demosOracle applications sla r12   SLA- demos
Oracle applications sla r12 SLA- demos
 
Steps on how to restrict sit s
Steps on how to restrict sit sSteps on how to restrict sit s
Steps on how to restrict sit s
 
Organization Setup in R12
Organization Setup in R12Organization Setup in R12
Organization Setup in R12
 
Oracle Applications R12 Sourcing Training
Oracle Applications R12 Sourcing TrainingOracle Applications R12 Sourcing Training
Oracle Applications R12 Sourcing Training
 
oracle enterprise asset management ppt
oracle enterprise asset management pptoracle enterprise asset management ppt
oracle enterprise asset management ppt
 
Mass Allocations
Mass AllocationsMass Allocations
Mass Allocations
 
Oracle Assets
Oracle AssetsOracle Assets
Oracle Assets
 
Oracle R12 Cash Management New Features
Oracle R12 Cash Management New FeaturesOracle R12 Cash Management New Features
Oracle R12 Cash Management New Features
 

Similar to Oracle cloud security | User Security, Roles, Access Control and more

Microsoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification TrainingMicrosoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification TrainingDavid Blumentals
 
Week-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdfWeek-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdfssuserc3fe80
 
Enterprise 365 - SoftServe presentation
Enterprise 365 - SoftServe presentationEnterprise 365 - SoftServe presentation
Enterprise 365 - SoftServe presentationSergii Alekseev
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerMike Reams
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsGregOracle
 
Database security 12.pdf
Database security 12.pdfDatabase security 12.pdf
Database security 12.pdfShajanShajan2
 
Security in oracle
Security in oracleSecurity in oracle
Security in oraclessuser40bb47
 
security in oracle database
security in oracle databasesecurity in oracle database
security in oracle databasessuser40bb47
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldNCCOMMS
 
Data Privacy By Design with AWS
Data Privacy By Design with AWSData Privacy By Design with AWS
Data Privacy By Design with AWSKrzysztof Kąkol
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodromDoina Draganescu
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceDavid Broussard
 
Designing for Privacy in AWS cloud
Designing for Privacy in AWS cloudDesigning for Privacy in AWS cloud
Designing for Privacy in AWS cloudKrzysztof Kąkol
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 

Similar to Oracle cloud security | User Security, Roles, Access Control and more (20)

Microsoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification TrainingMicrosoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification Training
 
Week-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdfWeek-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdf
 
Enterprise 365 - SoftServe presentation
Enterprise 365 - SoftServe presentationEnterprise 365 - SoftServe presentation
Enterprise 365 - SoftServe presentation
 
Oracle Identity Manager Basics
Oracle Identity Manager BasicsOracle Identity Manager Basics
Oracle Identity Manager Basics
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
 
Devi
DeviDevi
Devi
 
Database security 12.pdf
Database security 12.pdfDatabase security 12.pdf
Database security 12.pdf
 
Security in oracle
Security in oracleSecurity in oracle
Security in oracle
 
security in oracle database
security in oracle databasesecurity in oracle database
security in oracle database
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern World
 
Data Privacy By Design with AWS
Data Privacy By Design with AWSData Privacy By Design with AWS
Data Privacy By Design with AWS
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Security
SecuritySecurity
Security
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data Governance
 
Designing for Privacy in AWS cloud
Designing for Privacy in AWS cloudDesigning for Privacy in AWS cloud
Designing for Privacy in AWS cloud
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Oracle cloud security | User Security, Roles, Access Control and more

  • 2. Contents ◦ Security in ERP ◦ Common ERP Vulnerabilities ◦ Core Security Pillars ◦ Security in Oracle Cloud ◦ Oracle Cloud ERP Roles ◦ Function & Data Security Policies ◦ Setup Process in Oracle Cloud ◦ Creating Users ◦ Creating Custom Roles ◦ Extra Bytes ◦ Q&A?
  • 3. Security in ERP • ERP Security is a wide range of measures aimed at protecting Enterprise resource planning (ERP) systems from illicit access ensuring accessibility and integrity of system data • ERP system serves to unify the information intended to manage the organization • The Advantage of having ERP is that it provides data consistency and all in one solution
  • 4. Common ERP Vulnerabilities • Access Control • Inadequate Training • Failure to Comply • Unsecure Integration • Data Encryption and Masking issues • Complex Solutions
  • 5. Core Security Pillars • Data Encryption • Security Controls • Visibility • Hybrid Cloud • High Availability
  • 7. Oracle Cloud ERP Roles Oracle ERP Cloud uses 3 types of roles: Job Roles Represent jobs that users perform in an organization, e.g. General Accountant, Accounts Payable Manager Can be assigned to users Abstract Roles Represent people in the organization independent of the jobs they perform, e.g. Employee, Line Manager Can be assigned to users Duty Roles Logical collection of privileges that grant access to tasks that someone performs as part of a job Not assignable to users directly
  • 8. Function & Data Security Policies • Function Security Policies are defined via function security privileges • Each function security privilege secures the code resources that make up the relevant pages, page components (like tabs and buttons) and scheduled jobs • Data Security Policy defines access by a role, to a business object, with a condition and for an action (data security privilege) • Aggregate Privilege combines function security privileges with related data security policies
  • 9. Setup Process in Oracle Cloud Data Access Set Access Set Type Access Level Full Ledger Primary Balancing Segment Read Only Read and Write
  • 10. Implementing Security In Oracle Cloud • Create a User • Assign roles • Assign Security context to the user through Data Access Set
  • 11. Creating a User Use the Create User task to create users if Human Capital Management (HCM) is NOT being implemented. Create User task creates a minimal person record and a user account If HCM is being implemented, use the Hire an Employee task to create users instead. Hire an Employee task creates the full person record needed by HCM as well as the user account Use the Security Console to create implementation only users. Implementation users are user accounts without the associated person record.
  • 13. Managing Data Access ◦ Use the Manage Data Access for Users task to manage data scope assignments ◦ Search assignments for a single user or a single role ◦ You can further filter the search results, or export the results to Excel ◦ You can also authorize additional data accesses
  • 14. Extra Bytes – Data Import ◦ File based Data Import ◦ ADF Desktop Integration

Editor's Notes

  1. Demo
  2. Demo
  3. Demo
  4. Demo
  5. Demo
  6. Demo