Quién debería asistir
- Configuration Implementer
 - Business Analysts
 - Security Administrators
 - Security Compliance Professionals
 - Security Compliance Auditors
 - Administrator
 - Configuration Consultant
 - Process Developer
 
Objetivos del curso
- Describe how roles are implemented and used in Human Capital Management
 - Describe how roles are implemented and used in Financials
 - Describe how roles are implemented and used in Oracle Sales Cloud
 - Identify how security is implemented in the Oracle Cloud Applications
 - Name the required Oracle components used in the Fusion Applications Security Model
 - Understand what identify and access management means
 - Understand how identity and access management is implemented
 - Identify how the Functional Set Up Manager is used in the security model
 - List the differences between implementation and functional users
 - Locate the steps necessary to configure offerings and prepare for Enterprise Set Up
 - Identify what Enterprise Set Up is and how to prepare for the set up
 - List the different types of roles used in the security implementation for Fusion Applications
 - Describe the role hierarchy and describe the components used to create one
 - Name the common security elements used by all offerings in the Fusion Applications
 
Contenido del curso
Security Overview
- Identifying Required Installation Security Components
 - Understanding the Functions Done by each Component
 
Understanding Identity and Access Management
- Describing the Identity and Access Management Infrastructure
 - Describing Role Based Access Control
 - Learning How Oracle Identity Management is Used
 - Understanding Oracle Access Manager
 - Learning How Oracle Access Manager Processes Requests
 
Functional Set Up Manager
- Learning What Functional Set Up Manager Is
 - Understanding the User Types in Fusion Applications
 - Learning How to Create Users
 - Understanding Configuration Projects
 - Describing Set Up Data Export and Import
 
Demonstrating Enterprise Set Up
- Learning to Specify Enterprise Set Up Requirements
 - Seeing the Oracle Learning Environment Enterprise
 
Functional User Role Types and Provisioning
- Defining the Five Role Types
 - Defining Role Inheritance Hierarch
 - Understanding What Role Mapping Is
 
Role Provisioning to User
- Creating and Maintaining User Accounts
 - Understanding the New Hire Process
 - Understanding the HCM Role Provisioning Steps
 - Understanding the FSCM Role Provisioning Steps
 - Understanding the Sales Cloud Role Provisioning Steps
 
Understanding the Security Console
- Learning What the Security Console Is
 - Demonstrating Security Console Capabilities