Fusion Applications: Security Fundamentals
Starting dates and places
Description
The course goes beyond the modification of the delivered predefined roles and gives a risk-based approach to security management. This course is centered on business-driven security objectives.
The training approach includes demonstrations, hands-on activities, discussions, and knowledge checks that will enable you to implement and administer security in your Oracle Fusion Applications deployment.
Learn To:- Attain security goals in an Oracle Fusion Applications deployment.
- Administer security in Oracle Fusion Applications
- Support implementations with specific security requirements
Audience
- Administrator
- Security Administrators
- Security Compliance Auditors
- Security Compliance Professiona…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
The course goes beyond the modification of the delivered predefined roles and gives a risk-based approach to security management. This course is centered on business-driven security objectives.
The training approach includes demonstrations, hands-on activities, discussions, and knowledge checks that will enable you to implement and administer security in your Oracle Fusion Applications deployment.
Learn To:- Attain security goals in an Oracle Fusion Applications deployment.
- Administer security in Oracle Fusion Applications
- Support implementations with specific security requirements
Audience
- Administrator
- Security Administrators
- Security Compliance Auditors
- Security Compliance Professionals
- Implementation Consultant
Course Topics Security Fundamentals Course Overview Introduction to Oracle Fusion Applications Functional Setup Manager Overview Common Application Configuration Overview
- Overview of InFusion Corporation
- Defining Enterprise Structures
- Manage Primary Ledgers
- Ledger Security
- Managing Business Units
- Business Unit Security
- Areas of Risk
- Components Ensuring Integrity
- Hardening
- Production User Roles
- Identifying Orphaned, Ghost, or Inactive Accounts
- Passwords and Credentials
- Applications IDs
- Managing Audit Policies
- Implementation Users
- How Initial Implementation Users Are Stored and Managed
- Provisioning Initial Implementation Users with Roles
- Application Users
- How Application Users Are Created, Stored, and Managed
- Comparing Applications Users to Initial Implementation Users
- Creating Users
- Importing Users
- Security Reference Implementation
- Role-Based Access Control Overview
- Policies
- Function Security
- Data Security
- Data Roles
- Defining Data Security
- Provisioning Roles to Users
- Delegated Administration of Role Provisioning
- Role Mappings Key Concepts
- Role-Provisioning Strategies
- Role Provisioning Rules
- Role Provisioning Events
- Predefined Segregation of Duties (SOD) Policies
- Managing Application Access Controls
- Detection
- Reviewing Controls Monitors
- Reviewing Detected Violations
- Key Concepts
- Key Terms
- Security Reference Resources
Course Objectives
- Address the security administration tasks associated with bringing a new employee into the organization
- Review function security provided by duty (application) roles
- Review predefined data security policies, role template-generated data roles, and data roles determined by HCM security profiles
- Identify the means by which users access functions and data, such as through menus, search, analytics, and tag clouds, and how these access methods are secured
- Review the reference implementation to determine how to change job roles to more exactly represent the jobs within an enterprise
- Recognize security controls as a priority, from role-based access to enforcement across the deployed technology stack
- Understand which roles provide access to which activities
- Use Oracle Functional Setup Manager (FSM) to enable offerings and options
- Understand how access to the legal entity, ledger, and business unit enterprise structures is restricted
- Identify the security administration and hardening tasks that mitigate risk to achieve confidentiality, integrity, and availability
- Understand what security components and application strategies in Oracle Fusion Applications mitigate risk
- Differentiate creation of implementation users created before enterprise setup from creation of regular application users after enterprise setup
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.