SlideShare uma empresa Scribd logo
1 de 38
<Insert Picture Here>




Designing Security Roles
Functional Architecture Implementation Support (FAIS Team)
Kiran Mundy
May, 2012
Disclaimer

• I am an Oracle employee.
• The content of this Presentation is my own and does
  not necessarily reflect the views of Oracle.




                                                        2
Contents

• Overview
  •   Screens you need to know about..
  •   Designing a new role
  •   Privileges & Data Security Policies
  •   Data Roles
• Use Cases
  • Designing a new Role.
  • Generating a Data Role from a Template.
  • Stepping down a Duty hierarchy.
• Terminology



                                              3
Overview




           4
Screens you need to know about…
        Oracle Identity Manager                        Authorization Policy Manager
           (Delegated Administration)                     (Oracle Entitlements Server)
 Create
 Users                   Data       Create Roles
                         Role       & Hierarchies                Duties
          Assign Role

                        Generate   Role                 Duties   Duties
                                                                          Data Security   Object +
                                                                             Policy        Actions
                         Role      Role                          Duties
                                          Role                              Privilege     Screens
                                   Role                                                    and
                                          Role                                             Actions
                                                                                           within
                                                                                           Screens

Automatically                         Yes, you could create
Sent            HCM Screen            users and assign
                                      roles in OIM
            Create Person             But FSM Steps you
                                      through here because
   Roles Auto-provision
                                      HCM Employee details
                                      often needed in Apps



                                                                                                 5
Designing a New Role - Overview
     Oracle Identity Manager                    Authorization Policy Manager
        (Delegated Administration)                 (Oracle Entitlements Server)

                  Data       Create Roles
                  Role       & Hierarchies                  Duties



                 Generate   Role                 Duties     Duties
                                                                     Data Security   Object +
                                                                        Policy        actions
                  Role      Role                            Duties
                                     Role                              Privilege     Screens
                            Role                                                      and
                                     Role                                             Actions
                                                                                      within
                                                                                      Screens


Create a new Role & Assign           Create new Duties and             Create new
Duties under it. Generate a          assign Data Security Policies     Policies &
Data Role from it.                   & Privileges under it.            Privileges

                             Increasing Difficulty


                                                                                                6
Functional & Data Security Policies –

 Functional Policy =                     Data Security Policy =
 Code artifacts + Allowed Actions        DB Objects + Allowed actions.



   Fusion Apps Screen                                         Possible Actions:
                                                              Read
    Function                                   Object         Update
                                               behind
                                               screen
                                                          +   Delete
                                                              Manage


Note – If there is no data security policy specified on a duty role, it means
that all actions on all objects behind the screens (specified by functional
policy) are allowed.

                                                                                7
Data Roles


Data role  Takes the        Data Security Policy =
                             DB Objects + Allowed actions.
“data” your role has
                                                Invoices in BU 3
access to (from the right)
and slices it up by BU.
                                  Project         Possible Actions:
                                                 Possible Actions:
Each data role has
                                 Project
                                Project
                              Object =
                                         + +
                                           +      Read
                                                Possible Actions:
                                                 Read
                                               Possible Actions:
                                                Read
access to “one” slice.       Invoices in
                                BU 1
                                         +     Read


                                            Invoices in BU 2




                                                                      8
Powerpoint Demo




                  9
Designing a New Role – Where to
 Start…
• Security Reference Implementation – Gives Example
  Roles for each FSM Offering.
• Login to OER as Guest
  https://fusionappsoer.oracle.com/oer/index.jsp
• Search Criteria Type = Role, Logical Business Area =
  “All Fusion Apps…”
• Under Documentation Tab, open up “Security
  Reference Manual”




                                                         10
11
12
Lets say to Billing Inquiry
Duty, you want to add
“View Customer Account
Contact”




                              13
Creating/Changing Duty Roles – Start with FSM




                       Under “Define Security for …
                       <your offering>”, click on
                       “Manage Duties”




                                                      14
Find the Duty Role




Choose the right
Application & search
for the Duties




                       15
Can’t find Duty? Check -
Find Existing Policies      - Application
                            - Starts With vs Contains
                            - Display Name vs Role Name




                   Query up the Duty,
                   click on “Find Policies”
                   to see the existing
                   policies the role has




                                                          16
Alternatively Can Search – By Role




                                     17
Then Open the Duty




                     18
And Find Policies




                    19
“Open” Policies to see all policies




                                      20
Targets/Privileges shown..




                             21
Here’s the privilege we
wanted to add..




                          22
Create a new functional policy




                                 23
Add a target into the new policy




                                   24
Search for the target (or entitlement)..




                                           25
Give the new policy a name and save…




                                       26
Re-query the Duty..




  New policy and target
  show up…



                          27
Existing Data Security Policies




                 Apparently there are no data security
                 policies for “Billing Inquiry Duty” as
                 yet, which means –
                 Data access behind the screen is not
                 restricted at this level.




                                                          28
Generating Data Roles

• After you’ve implemented your system and have your
  BU’s etc in..
• Figure out which role templates you want to use to
  generate your data roles… (How?)




                                                       29
Find the Role Template




                         30
Preview Roles about to be generated..




                                        31
Verify that they look correct…




                                 32
Click on “Generate Roles”




                            33
Terminology




              34
Terminology Review
• Security Reference Implementation
  • An complete example implementation of Security for each
    Fusion Offering.
  • Details in Security Reference Manuals for each Product.
• Role (External Role or Enterprise Role)
  • Created in LDAP (Using Oracle Identity Manager)
  • Can also create a hierarchy of these Roles
  • Normally data roles are generated which also govern the
    Business Unit (or other determinant) stripe of data the user
    will see.
• Role Category
  • A way to classify roles.
  • Examples from Reference Implementation - HCM Abstract
    Roles, HCM Job Roles, Financials Job Roles etc..


                                                                   35
Terminology
• Abstract Role (External Role or Enterprise Role)
  • “Abstract” is nothing more than a category we seed to classify
    roles in our Reference Implementation.
  • Roles we seed that are in this category are -
     • Accessory roles such as - Employee, Contingent Worker
       etc.
     • Not a role you would find described on Monster.com
     • Usually assigned directly - does not require data role
       generated on top of it.
• Job Role
  • Also nothing more than a category we seed.
  • Roles we seed that are in this category are -
     • Roles that you would hire someone into – Accounts
       Payables Manager, Billing Clerk etc.
     • Usually requires a data role generated on top of it.

                                                                     36
Terminology

• Duty Role (Application Role or Principal)
  • This is the most granular form of role which is created and
    managed in Authorization Policy Manager. Privileges & data
    security policies are assigned to it.
• Functional Policy
  • Each policy contains a set of targets that the policy provides
    access to.
• Entitlement (or Privilege or Target)
  • Screens, buttons, lists, web services or other code artifacts




                                                                     37
Terminology

• Data Security Policy
  • Specifies an Object and what actions you can do to it.
    Possible actions you can pick from to create a policy are pre-
    defined for each Business Object.
• Database Resource
  • Database table or groups of tables with data.




                                                                     38

Mais conteúdo relacionado

Mais procurados

R12 features presentation inventory management
R12 features presentation inventory managementR12 features presentation inventory management
R12 features presentation inventory management
Amine Gallah
 
Oracle Fusion Financials Overview
Oracle Fusion Financials OverviewOracle Fusion Financials Overview
Oracle Fusion Financials Overview
Berry Clemens
 

Mais procurados (20)

Oracle EBS R12 Payroll user manual
Oracle EBS R12 Payroll user manualOracle EBS R12 Payroll user manual
Oracle EBS R12 Payroll user manual
 
Oracle R12 Order Management - Back to Back (B2B) Order Flow:
Oracle R12 Order Management - Back to Back (B2B) Order Flow:Oracle R12 Order Management - Back to Back (B2B) Order Flow:
Oracle R12 Order Management - Back to Back (B2B) Order Flow:
 
Oracle Payable Complete Business flows
Oracle Payable Complete Business flowsOracle Payable Complete Business flows
Oracle Payable Complete Business flows
 
Oracle receivables
Oracle receivablesOracle receivables
Oracle receivables
 
Oracle Fixed assets ivas
Oracle Fixed assets ivasOracle Fixed assets ivas
Oracle Fixed assets ivas
 
Oracle EBS R 12 Core hr user manual
Oracle EBS R 12 Core hr user manualOracle EBS R 12 Core hr user manual
Oracle EBS R 12 Core hr user manual
 
BR100 Oracle AP Setup
BR100 Oracle AP SetupBR100 Oracle AP Setup
BR100 Oracle AP Setup
 
Encumbrance accounting in oracle ebs r12
Encumbrance accounting in oracle ebs r12Encumbrance accounting in oracle ebs r12
Encumbrance accounting in oracle ebs r12
 
One time payment requests in Oracle ERP Cloud
One time payment requests in Oracle ERP CloudOne time payment requests in Oracle ERP Cloud
One time payment requests in Oracle ERP Cloud
 
R12 features presentation inventory management
R12 features presentation inventory managementR12 features presentation inventory management
R12 features presentation inventory management
 
Introduction to Oracle Financials
Introduction to Oracle FinancialsIntroduction to Oracle Financials
Introduction to Oracle Financials
 
Oracle Fusion Application
Oracle Fusion ApplicationOracle Fusion Application
Oracle Fusion Application
 
Oracle EBS HRMS SETUP
Oracle EBS HRMS SETUPOracle EBS HRMS SETUP
Oracle EBS HRMS SETUP
 
Oracle Fusion Financials Overview
Oracle Fusion Financials OverviewOracle Fusion Financials Overview
Oracle Fusion Financials Overview
 
5 enterprise structures
5   enterprise structures5   enterprise structures
5 enterprise structures
 
Oracle Inventory
Oracle InventoryOracle Inventory
Oracle Inventory
 
Oracle Fusion & Cloud Applications Overview
Oracle Fusion & Cloud Applications OverviewOracle Fusion & Cloud Applications Overview
Oracle Fusion & Cloud Applications Overview
 
Oracle fusion financial p2p cycle
Oracle fusion financial  p2p cycleOracle fusion financial  p2p cycle
Oracle fusion financial p2p cycle
 
Oracle applications sla r12 SLA- demos
Oracle applications sla r12   SLA- demosOracle applications sla r12   SLA- demos
Oracle applications sla r12 SLA- demos
 
Oracle inventory R12 Setup Guide
Oracle inventory R12 Setup GuideOracle inventory R12 Setup Guide
Oracle inventory R12 Setup Guide
 

Semelhante a Oracle Fusion Applications Security - Designing Roles

Sap inside track_2011_marks_sap_business_objects_security
Sap inside track_2011_marks_sap_business_objects_securitySap inside track_2011_marks_sap_business_objects_security
Sap inside track_2011_marks_sap_business_objects_security
sjohannes
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
debbanerjee
 
Brief introduction to domain-driven design
Brief introduction to domain-driven designBrief introduction to domain-driven design
Brief introduction to domain-driven design
Yongqiang Li
 
OWASP Identity Manegement
OWASP Identity ManegementOWASP Identity Manegement
OWASP Identity Manegement
Flávio Silva
 
A Brief Tour of Responsability Driven Design
A Brief Tour of Responsability Driven DesignA Brief Tour of Responsability Driven Design
A Brief Tour of Responsability Driven Design
elliando dias
 
Jazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud GovernanceJazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud Governance
Netcetera
 
Award Winning Data Governance
Award Winning Data GovernanceAward Winning Data Governance
Award Winning Data Governance
DATAVERSITY
 
The CrowdSearch framework
The CrowdSearch frameworkThe CrowdSearch framework
The CrowdSearch framework
CUbRIK Project
 
Extending Workflow Foundation With Custom Activities
Extending Workflow Foundation With Custom ActivitiesExtending Workflow Foundation With Custom Activities
Extending Workflow Foundation With Custom Activities
rsnarayanan
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
DATAVERSITY
 
Alfresco day madrid jeff potts - activiti
Alfresco day madrid   jeff potts - activitiAlfresco day madrid   jeff potts - activiti
Alfresco day madrid jeff potts - activiti
Alfresco Software
 
Alfresco Day Madrid - Jeff Potts - Activiti
Alfresco Day Madrid - Jeff Potts - ActivitiAlfresco Day Madrid - Jeff Potts - Activiti
Alfresco Day Madrid - Jeff Potts - Activiti
Toni de la Fuente
 

Semelhante a Oracle Fusion Applications Security - Designing Roles (20)

Sap inside track_2011_marks_sap_business_objects_security
Sap inside track_2011_marks_sap_business_objects_securitySap inside track_2011_marks_sap_business_objects_security
Sap inside track_2011_marks_sap_business_objects_security
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Brief introduction to domain-driven design
Brief introduction to domain-driven designBrief introduction to domain-driven design
Brief introduction to domain-driven design
 
OWASP Identity Manegement
OWASP Identity ManegementOWASP Identity Manegement
OWASP Identity Manegement
 
Hypothesis Based Testing: Power + Speed.
Hypothesis Based Testing: Power + Speed.Hypothesis Based Testing: Power + Speed.
Hypothesis Based Testing: Power + Speed.
 
A Brief Tour of Responsability Driven Design
A Brief Tour of Responsability Driven DesignA Brief Tour of Responsability Driven Design
A Brief Tour of Responsability Driven Design
 
Jazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud GovernanceJazoon'12 Enterprise-wide Cloud Governance
Jazoon'12 Enterprise-wide Cloud Governance
 
EBS and PDH, a comparision
EBS and PDH, a comparisionEBS and PDH, a comparision
EBS and PDH, a comparision
 
Award Winning Data Governance
Award Winning Data GovernanceAward Winning Data Governance
Award Winning Data Governance
 
The CrowdSearch framework
The CrowdSearch frameworkThe CrowdSearch framework
The CrowdSearch framework
 
Ria
RiaRia
Ria
 
Authorization Services
Authorization ServicesAuthorization Services
Authorization Services
 
Extending Workflow Foundation With Custom Activities
Extending Workflow Foundation With Custom ActivitiesExtending Workflow Foundation With Custom Activities
Extending Workflow Foundation With Custom Activities
 
Social Modeling
Social ModelingSocial Modeling
Social Modeling
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Role-Based Access Control
Role-Based Access ControlRole-Based Access Control
Role-Based Access Control
 
Alfresco day madrid jeff potts - activiti
Alfresco day madrid   jeff potts - activitiAlfresco day madrid   jeff potts - activiti
Alfresco day madrid jeff potts - activiti
 
Alfresco Day Madrid - Jeff Potts - Activiti
Alfresco Day Madrid - Jeff Potts - ActivitiAlfresco Day Madrid - Jeff Potts - Activiti
Alfresco Day Madrid - Jeff Potts - Activiti
 
Understanding Interaction Design
Understanding Interaction DesignUnderstanding Interaction Design
Understanding Interaction Design
 
Securing the Automation of Application Deployment with UrbanCode Deploy
Securing the Automation of Application Deployment with UrbanCode DeploySecuring the Automation of Application Deployment with UrbanCode Deploy
Securing the Automation of Application Deployment with UrbanCode Deploy
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Oracle Fusion Applications Security - Designing Roles

  • 1. <Insert Picture Here> Designing Security Roles Functional Architecture Implementation Support (FAIS Team) Kiran Mundy May, 2012
  • 2. Disclaimer • I am an Oracle employee. • The content of this Presentation is my own and does not necessarily reflect the views of Oracle. 2
  • 3. Contents • Overview • Screens you need to know about.. • Designing a new role • Privileges & Data Security Policies • Data Roles • Use Cases • Designing a new Role. • Generating a Data Role from a Template. • Stepping down a Duty hierarchy. • Terminology 3
  • 5. Screens you need to know about… Oracle Identity Manager Authorization Policy Manager (Delegated Administration) (Oracle Entitlements Server) Create Users Data Create Roles Role & Hierarchies Duties Assign Role Generate Role Duties Duties Data Security Object + Policy Actions Role Role Duties Role Privilege Screens Role and Role Actions within Screens Automatically Yes, you could create Sent HCM Screen users and assign roles in OIM Create Person But FSM Steps you through here because Roles Auto-provision HCM Employee details often needed in Apps 5
  • 6. Designing a New Role - Overview Oracle Identity Manager Authorization Policy Manager (Delegated Administration) (Oracle Entitlements Server) Data Create Roles Role & Hierarchies Duties Generate Role Duties Duties Data Security Object + Policy actions Role Role Duties Role Privilege Screens Role and Role Actions within Screens Create a new Role & Assign Create new Duties and Create new Duties under it. Generate a assign Data Security Policies Policies & Data Role from it. & Privileges under it. Privileges Increasing Difficulty 6
  • 7. Functional & Data Security Policies – Functional Policy = Data Security Policy = Code artifacts + Allowed Actions DB Objects + Allowed actions. Fusion Apps Screen Possible Actions: Read Function Object Update behind screen + Delete Manage Note – If there is no data security policy specified on a duty role, it means that all actions on all objects behind the screens (specified by functional policy) are allowed. 7
  • 8. Data Roles Data role  Takes the Data Security Policy = DB Objects + Allowed actions. “data” your role has Invoices in BU 3 access to (from the right) and slices it up by BU. Project Possible Actions: Possible Actions: Each data role has Project Project Object = + + + Read Possible Actions: Read Possible Actions: Read access to “one” slice. Invoices in BU 1 + Read Invoices in BU 2 8
  • 10. Designing a New Role – Where to Start… • Security Reference Implementation – Gives Example Roles for each FSM Offering. • Login to OER as Guest https://fusionappsoer.oracle.com/oer/index.jsp • Search Criteria Type = Role, Logical Business Area = “All Fusion Apps…” • Under Documentation Tab, open up “Security Reference Manual” 10
  • 11. 11
  • 12. 12
  • 13. Lets say to Billing Inquiry Duty, you want to add “View Customer Account Contact” 13
  • 14. Creating/Changing Duty Roles – Start with FSM Under “Define Security for … <your offering>”, click on “Manage Duties” 14
  • 15. Find the Duty Role Choose the right Application & search for the Duties 15
  • 16. Can’t find Duty? Check - Find Existing Policies - Application - Starts With vs Contains - Display Name vs Role Name Query up the Duty, click on “Find Policies” to see the existing policies the role has 16
  • 17. Alternatively Can Search – By Role 17
  • 18. Then Open the Duty 18
  • 20. “Open” Policies to see all policies 20
  • 22. Here’s the privilege we wanted to add.. 22
  • 23. Create a new functional policy 23
  • 24. Add a target into the new policy 24
  • 25. Search for the target (or entitlement).. 25
  • 26. Give the new policy a name and save… 26
  • 27. Re-query the Duty.. New policy and target show up… 27
  • 28. Existing Data Security Policies Apparently there are no data security policies for “Billing Inquiry Duty” as yet, which means – Data access behind the screen is not restricted at this level. 28
  • 29. Generating Data Roles • After you’ve implemented your system and have your BU’s etc in.. • Figure out which role templates you want to use to generate your data roles… (How?) 29
  • 30. Find the Role Template 30
  • 31. Preview Roles about to be generated.. 31
  • 32. Verify that they look correct… 32
  • 33. Click on “Generate Roles” 33
  • 35. Terminology Review • Security Reference Implementation • An complete example implementation of Security for each Fusion Offering. • Details in Security Reference Manuals for each Product. • Role (External Role or Enterprise Role) • Created in LDAP (Using Oracle Identity Manager) • Can also create a hierarchy of these Roles • Normally data roles are generated which also govern the Business Unit (or other determinant) stripe of data the user will see. • Role Category • A way to classify roles. • Examples from Reference Implementation - HCM Abstract Roles, HCM Job Roles, Financials Job Roles etc.. 35
  • 36. Terminology • Abstract Role (External Role or Enterprise Role) • “Abstract” is nothing more than a category we seed to classify roles in our Reference Implementation. • Roles we seed that are in this category are - • Accessory roles such as - Employee, Contingent Worker etc. • Not a role you would find described on Monster.com • Usually assigned directly - does not require data role generated on top of it. • Job Role • Also nothing more than a category we seed. • Roles we seed that are in this category are - • Roles that you would hire someone into – Accounts Payables Manager, Billing Clerk etc. • Usually requires a data role generated on top of it. 36
  • 37. Terminology • Duty Role (Application Role or Principal) • This is the most granular form of role which is created and managed in Authorization Policy Manager. Privileges & data security policies are assigned to it. • Functional Policy • Each policy contains a set of targets that the policy provides access to. • Entitlement (or Privilege or Target) • Screens, buttons, lists, web services or other code artifacts 37
  • 38. Terminology • Data Security Policy • Specifies an Object and what actions you can do to it. Possible actions you can pick from to create a policy are pre- defined for each Business Object. • Database Resource • Database table or groups of tables with data. 38