Oracle Pricing Security Information Age Applications Elizabeth M. Sousa Sr Solution Consultant Oracle Applications.

Slides:



Advertisements
Similar presentations
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Advertisements

Price List Utilities.
Tutorial EBSCOadmin User Groups support.ebsco.com.
SESSION TWO SECURITY AND GROUP PERMISSIONS Security and Group Permissions.
QAD Integrated Customization Toolkit (ICT)
Metron Consulting Does Your Istore Load Quick Enough Rajavel Ramalingam Sami Vellaiyan Jan 21, 2008.
User Management DigiTool Version 3.0. User Management 2 User Architecture PatronsStaff Users DepositorsApprovers Meditor User Management Management Module.
DigiTool User Architecture and Overview DigiTool Version 3.0.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Title Slide without Picture Subtitle Presenter’s Name Presenter’s Title Organization,
Updating Your Profile Press F5 to begin the slide show. Slides will automatically advance. February
ShelterPoint™ Data-Entry Workflows. ShelterPoint v5.2.3.
1 WARFIGHTER SUPPORT ENHANCEMENT STEWARDSHIP EXCELLENCE WORKFORCE DEVELOPMENT WARFIGHTER-FOCUSED, GLOBALLY RESPONSIVE, FISCALLY RESPONSIBLE SUPPLY CHAIN.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1  This presentation provides a general overview of using the Service Access.
MEGS+ Michigan Electronic Grants System Plus Office of Special Education May 2012.
Cizer.NET Reporting Forum for Business Intelligence Copyright © 2005 Cizer Software OR
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
RMsis – v Simplify Requirement Management for JIRA.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
Time Saving Tips & Tricks Enable System Administrator Access to All User Logins In the past, in order for Salesforce.com System Administrators to be able.
Understanding ADAM Version 2.0 ADAM Training Session.
Copyright © Oracle Corporation, All rights reserved. Oracle Order Management & Quoting Functional Overview , , Key Product Highlights.
0 eCPIC User Training: Resource Library These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
Controlling User Access. Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and.
Instructor: Dema Alorini Database Fundamentals IS 422 Section: 7|1.
What's New… in R10! SEP 22, Call Reports.
Module 4: Managing Recipients. Overview Introduction to Exchange Recipients Creating, Deleting, and Modifying Users and Contacts Managing Mailboxes Managing.
Dave Muirhead Director of Electronic Customer Self-Service Oracle Corporation.
My Dashboard (for Corporate Users) Intuit Financial Services University Business Financial Solutions Certification.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Copyright © 2007, Oracle. All rights reserved. Implementing Role-Based Security.
Items Version 18 Upgrade Training. Items: Version 18 Upgrade Training 2 All of the information in this document is the property of Ex Libris Ltd. It may.
Copyright © 2007, Oracle. All rights reserved. Using the Product Workbench.
Cash Management Security. Objectives After completing this lesson, you should be able to do the following: Describe Cash Management security Create security.
Copyright © 2007, Oracle. All rights reserved. Managing Items and Item Catalogs.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | What You Need to Know About User Defined Objects (UDOs) With Tools Release 9.2.
Controlling User Access
Controlling User Access
Welcome to the CardSaver VoIP Billing & Call Management Demonstration
Create and Assign Entity Roles
iShop Training Module Access & Security
Custom Profile Options
“Introduction to Azure Security Center”
School Management Systems
Using E-Business Suite Attachments
Network Interface Panel Proposition
Document Flow Manager 4.10 CEVA Business Users
Database Security.
What You Need to Know About User Defined Objects (UDOs) With Tools Release 9.2
What’s New in SQL Server 2016 Master Data Services
Cisco Unity Connection
Database Security.
Get z0-499 Actual Tests - 1z0-499 Actual Dumps PDF - Dumps4download.us
Pass Oracle 1Z0-499 Exam with Valid 1Z0-499 Exam Question Answers - Dumps4download
HCM Cloud: Person Spotlight Redesigned
Link Inventory Tool User Guide Part 1: About Linking
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
אבטחת נתונים בסביבת SQL Data Security
Data Model.
Basics to Know and Best Practices to Do
Cash Pools.
Critical Design Review Version Additional Hierarchy for
Advanced multi-user capabilities in Dev Center
TracCloud.
Presentation transcript:

Oracle Pricing Security Information Age Applications Elizabeth M. Sousa Sr Solution Consultant Oracle Applications

New with New HTML user interface Available in both Basic and Advanced Pricing Data security at the Price List and Modifier levels Oracle Pricing Security

Useful for users whose business process dictates a level of pricing security across organizations Now be able to secure access to pricing data and pricing related order data –Access ONLY the information that is relevant to the user Updating and viewing of Pricing Entities restricted to users that have appropriate authority level Oracle Pricing Security

Rules can be set up to view and/or maintain Price Lists and Modifiers by: –Org ID –Responsibility –User level Can be set up at group or an individual level Oracle Pricing Security

In Order Management pricing engine will search for price lists and modifiers –In current user’s organization –Or for all when price and modifiers are marked as global Oracle Pricing Security

Security Self-service UI provide Pricing Administrator with EASY ways to manage the security for the pricing entities Includes security for standard pricelist, modifiers and agreement pricelist. UI is USER FRIENDLY!! Oracle Pricing Security

Pricing Security Terms

Pricing Entity Security –Highest level of security for Oracle Pricing –New Responsibility with access to ALL pricing entities without restriction Pricing Entity –Pricelist, Modifier List, or Pricing Agreement Entity Set –Set of Pricing Entities that can be used as Entity Type to which you can grant privileges with “maintain” or “view only” access levels Oracle Pricing Security Terms

Entity Type –One of the following Entities: Standard Price list Modifier List Pricing Agreement Entity Set Entity Usage –Grants Entity’s usage to one or all operating units so it can be used during engine calls Oracle Pricing Security Terms

Grantee Type –Level to which privileges are granted Global: All users with access to pricing menus Operating Unit: Users within operating unit Responsibility: Users within named responsibility User: specified user Access Level –View Only: View but not update Pricing Entity –Maintain: Enables user to vie and update Pricing Entity Oracle Pricing Security Terms

Pricing Security Demo

You can search/view/update/delete/bulk delete/create/bulk create privileges by providing different Entity Type, Entity Name, Grantee Type, Grantee Name information

Oracle Pricing Security Express Create Privilege Screen Quickly restrict access to a specified pricing entity with access levels of Maintain or View Only. Works well as a quick security administrative tool for the Advanced Pricing Security Administrator. –Example: Give all users with functional access to Price Lists, the ability to view, and maintain (update) Price List named Corporate regardless of which Operating Unit they are assigned to.

Select multiple pricing entities and create privileges through a three-step process Oracle Pricing Security Bulk Create Privilege Screen

Oracle Pricing Security Delete Privilege Screen

Search/view/delete/create entity sets. You can search specific sets or all sets. Oracle Pricing Security Entity Sets

Search/view/update/bulk update engine runtime security. Security Administrator can update Global Usage one at a time or use ‘Bulk Update Entity Usage’ to make updates to multiple entities that can be used by an Operating Unit when pricing orders. Oracle Pricing Security Entity Usage

Not automatically turned on with upgrade See User Guide for steps to set up Oracle Pricing Security