Oracle Fusion HCM Cloud Security Essentials
This Fusion HCM Security Essentials training course presents an overview of Fusion Applications Security Model and the key concepts, core technologies, and common procedures involved in setting up and securing Oracle Fusion HCM Cloud Applications.
You will gain experience with Role Based Access Control concept and a range of security components for performing common security-related tasks.
Video Duration: 7 hours
Suggested Prerequisites
- Basic computer knowledge
- A good understanding of Oracle Fusion Core HR processes is preferred but not mandatory
- Domain knowledge will help but not mandatory
Oracle Fusion HCM Cloud Security Essentials – Course Outline
- Gain сomplete and detailed knowledge about Oracle Fusion HCM Security Model
- Identify and manage the different types of roles, including aggregate privileges and data, abstract, job, and duty roles.
- Understand a technical implementation of roles in the system
- Manage Application Users
- Create role-provisioning rules
- Provision roles to users
- Create security profiles to restrict data access
- Create data roles and assign security profiles to them
- Using dynamic security profiles
- Identify Oracle Fusion Middleware Security Tools
- Create a custom roles in the Security Console
- Use the many features of the Security Console
What am I going to get from this course?
- Over 16 lectures and 7 hours of content!
- Get a solid foundation on Fusion HCM Security
- Become familiar with all the key configuration tasks during an implementation of a security layer
What is the Target Audience?
- Implementation Consultants
- Security Administrators
- Security Compliance Managers
- Team Leader
- Technical Administrator
**This course does not come with Fusion instance access
Course Curriculum
SECTION 1: FUSION HCM SECURITY CONCEPT | |||
Introduction to Fusion Security | FREE | 00:13:00 | |
Introduction to Fusion Roles | 00:26:00 | ||
Fusion Roles Technical Representation | 00:34:00 | ||
Case Study: Read Only Access | 00:07:00 | ||
SECTION 2: USER MANAGEMENT, ROLE PROVISIONING AND DELEGATION | |||
User Management | 00:25:00 | ||
Role Provisioning | 00:35:00 | ||
Role Provisioning during New Hire | 00:08:00 | ||
SECTION 3: HCM DATA ROLES | |||
Introduction to Data Roles | 00:23:00 | ||
Fusion Security Profiles Part I | 00:39:00 | ||
Fusion Security Profiles Part II | 00:36:00 | ||
Case Study: Dynamic Security Profile | 00:48:00 | ||
SECTION 4: ORACLE FUSION MIDDLEWARE SECURITY TOOLS | |||
Fusion Middleware Security Tools: Oracle Identity Manager (OIM) | 00:27:00 | ||
Fusion Middleware Security Tools: Authorization Policy Manager (APM) | 00:36:00 | ||
SECTION 5: USING THE SECURITY CONSOLE | |||
Security Console Concepts | 00:33:00 | ||
Changing Application Stripes | 00:10:00 | ||
Case Study: Custom HR Data Entry Operator Role | 00:30:00 |
Course Reviews
20 STUDENTS ENROLLED
Very Good Overview
If you’re the type willing to learn using Oracle’s documentation, this course is a good complement. Since the documentation has no illustrations, it’s hard to relate to the topic under discussion. This course helps greatly in that regard.
Very good overview of Security module
This course is an excellent complement with case studies to Oracle Documentation on Security course.