Leon Tu Applications Technology Group Oracle Corporation

Slides:



Advertisements
Similar presentations
AmeriCorps is introducing a new online payment system for the processing of AmeriCorps forms
Advertisements

PRODUCTVIEWS USERPROGRAMS with Colleen Alber Design & Implement a DKT Solution.
Pharos Uniprint 8.3.
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Recruitment Booster.
Home This training presentation is designed to introduce the Residency Management Suite to new users. This presentation covers the following topics: Login.
6 th Annual Focus Users’ Conference 6 th Annual Focus Users’ Conference Profiles and User Permissions Presented by: Josh Mostyn Presented by: Josh Mostyn.
Case Study By: Susan Gulick Principal Consultant – Solutions Partners, Inc. May 18, 2005 Oracle Self-Service HR.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Program Management Portal: Overview for the Client
PantherSoft Financials 9.2 Fundamentals Office of the Controller
National Service Trust Automation Project Training Materials: Members and Alumni Corporation for National & Community Service (CNCS) National Service Trust.
Single Sign On Tutorial for New Employees February 10, 2005.
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
Workflow & Event Derivation Workshop
EmpowHR EmpowHR Security Overview. 2 Application Security Administration Permission List Roles User Profiles Row level security Distributed Security Administration.
Workflow & Event Derivation Workshop
Smart HR Need a subtitle Presented by Marc Levinson & Swetha Lingala.
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Title Slide without Picture Subtitle Presenter’s Name Presenter’s Title Organization,
Access and Identity Management for Enterprise Portals Rohit Gupta Director, Identity Management Product Management Oracle Corporation.
Train The Trainer Employee Central Administration
Employee Central HR Administrator
Opening SharePoint to External Users.  Centralize all files  Eliminate the need for Matching Subs RFI’s to our RFI’s (Dan Campbell, ETC)  Create a.
Electronically approve and create Suppliers in Oracle Financials using a combination of APEX and Oracle Workflow. NZOUG Conference 2010 Brad Sayer Team.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
MDECA SECURITY UPDATES Update & Review for Security Changes!
Employee Central Administration
RECALL THE MAIN COMPONENTS OF KIM Functional User Interfaces We just looked at these Reference Implementation We will talk about these later Service Interface.
Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
Copyright © Oracle Corporation, All rights reserved. Oracle Human Resources Functional Overview , Key Product Highlights.
Module 3: Administrator Set-Up Intuit Financial Services University Internet Banking Certification Training.
Home NEW INNOVATIONS Resident/Fellow Introduction NEW INNOVATIONS Resident/Fellow Introduction This presentation includes the following topics: Login Notifications.
Training Role Module 8 – User Admin Ver. 10 Oct 2009.
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
Approvals Management with TCA Hierarchy Ajoy A. Devadawson Oracle Corporation - Consulting.
1 SMART Training Update – May 2011 Michaela Butterworth.
0 eCPIC Admin Training: Automating User Account Management These training materials are owned by the Federal Government. They can be used or modified only.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Erie 1 BOCES / WNYRIC eBOCES applications Visit us at:
Windows Role-Based Access Control Longhorn Update
Home This training presentation is designed to introduce the Residency Management Suite to new users This presentation covers the following topics: Login.
A Technical Guide to ERMS Bill Manago, CRM. What You Need to Plan For Implementing an Electronic Records Management System Out of the Box What you should.
HR Information System Upgrade ONLINE ENGAGEMENT & ONBOARDING.
Copyright © 2006, Infinite Campus, Inc. All rights reserved. User Security Administration.
©2013 JPMorgan Chase & Co. Proprietary and Confidential smartdata.gen2 Expense Report Training.
Global Field Operations From Vision to Value Cisco Confidential1© 2011 Cisco and/or its affiliates. All rights reserved. Access to PMC Partner Training.
How to CORRECTLY Complete a TEASE Access Request Form.
American Diploma Project Administrative Site Training.
(Required for DTCs, Recommended for STCs)
Melissa Wagner & Jaime Patel
Software Application Overview
Chapter 14: System Protection
Riding the Wave of Innovation
ERO Portal Overview & CFR Tool Training
MyGaDOE Portal Provisioning for Security Officers
Setting Up and Supporting Clients Using Employee Development in ADP Workforce Now [Developer: Use this slide if you are not using audio. You can add.
Expense Report Training
iCIMS 17.3 Release: Highlights
How to Create and Start a Test Session
Cyber Recruiter: Sneak Peak
(Required for DTCs, Recommended for STCs)
Chapter 14: Protection.
Overview of Oracle Site Hub
BCS Template Presentation February 22, 2018
CFR Enhancement Session
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Presentation transcript:

Leon Tu Applications Technology Group Oracle Corporation Security Administration in Oracle E-Business Suite: Overview of Oracle User Management Leon Tu Applications Technology Group Oracle Corporation

Business Needs for User Management Unified approach to create and maintain users Improved Security Easier User Administration The Oracle E-business Suite consists of several self-service applications. These applications generally require users to authenticate themselves before they can perform certain tasks such as purchase items from an online store, or create a service request. To be able to use these applications, specific user information may be required. For example, the online store requires the user’s credit card information for purchasing items, while information related to user’s orders may be required to complete a service request. Obviously, creating application-specific users is not a viable solution. Our goal in User Management is to provide a unified approach to creating users which reduces redundancy, simplifies maintenance and results in improved user experience. The E-Business Suite also needs to address important security considerations. For example, what applications can a user access? What functions can the user perform? What role does a user play in the system, and what data can the user access? These and other security issues must be addressed in a manner that is easy to setup, maintain, and use. The overall maintenance and administration of users must be easy and should involve few, if any, manual processes. In addition, administrators must be able to delegate their responsibilities to local administrators who have limited administrative privileges for a subset of their organization’s users.  Oracle User Management attempts to address all these important business needs. Provide Delegation Capabilities

Oracle User Management Self Service Features Delegated Administration Provisioning Services Role Based Access Control Data Security Function Security

Function Security

Function Security Functions represent basic entry points / operations / secured resources that do not have any data context, for example: “Page X” “Region Y” Typically done using responsibilities in Ebusiness suite Employee HR Self Service Manager HR Self Service Hiring / Firing Transfers Promotions Compensation Personal Info Job Posts Pay Slip

Data Security Function Security

Data Security What business objects / documents hold sensitive data & need to be secured For example: Expense Reports, Employees What secured operations can be performed on each object For example: update, delete, reject, approve, escalate Secured operations are represented as privileges aka permissions Authorization Policy: grant [someone] access to perform [a set of operations] on a given [set of business documents]: [Managers] can [view, approve, reject, update] [expense reports] [filed by their direct reports] Sets of business documents are identified through Object(instance sets (SQL predicates))

Data Security Grants Data security grants are only in effect when working on records which meet a filter criteria. Data filter types: Single instance (ad-hoc) Applies to a specific instance of an object "John may manage project 123" Instance set (policy) Applies to rows which match a WHERE clause "Employees may view public projects“ “Where project_status_flag = ‘PUB’”

Data Security Service Data security grants hold access policies Application maintains a context User context: user identity and derived attributes Data context: data record that is “in focus” Data security service answers questions Which records can I perform a given function on Which functions can I perform on a given record Application restricts access accordingly Limited uptake right now (manual coding) Will be built into the framework (automatic) later

Role Based Access Control Data Security Function Security

Role Based Access Control RBAC standard (ANSI INCITS 359-2004) A role consists of Other roles (via inheritance) Responsibilities (via inheritance) Permissions Function Security Policies Data Security Policies A user can be assigned with several roles A role can be assigned to several users Speaker Notes User Management introduces the role based access control. A key feature of this model is that all access is through roles. A role can be configured to consolidate responsibilities, permissions and data security rules that are required for users to perform a specific function. Access privileges are inherited based on the roles assigned to the user. Also, a user can be assigned several roles – for example a user can play a role of an employee as well as a part of the sales rep at the same time. Also, several users can play the same role at any given time. Once again, all the employees in an organization play the employee role 

EBS RBAC Model - Users Users can be: Humans Internal: Employees External: Customers Systems Internal: integrated applications (A2A) External: trading partners (B2B) User User User User User User

EBS RBAC Model - Roles Roles can be: EBS Responsibilities HR Positions User User Role Roles can be: EBS Responsibilities HR Positions TCA Groups LDAP Roles UMX Access Roles Hierarchical User User Role Role User User Role User User Role

EBS RBAC Model - Permissions User Permission User Role Permission Permissions can be: Screens/Flows APIs/Services Data Operations User Permission User Role Role Permission User Permission User Role Permission User Permission User Role Permission

EBS RBAC Model - Permission Sets User Permission User Role Set Permission User Permission Sets are defined using the Menu structure Permission User Role Role Permission User Set Permission User Role Permission Set User Permission Set User Role Permission

EBS RBAC Model - Grants User Permission User Role Set Permission User

EBS RBAC Model - Grants Grants represent security policies Gives a role access to a set of permissions With optional context restriction Responsibility Organization Data set Some permissions are "context independent" Grants represent security policies "Employees have access to expense reporting" You should not to worry about navigation menus when defining security policy...

Case Study Grant access to a set of Sales Managers Need access to: HR Self Service Manager + Employee access Sales Online Sales Manager access Expenses iProcurement The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre 11.5.10 and how the setup differs in 11.5.10 release

Access Control before.. Users directly assigned Responsibilities Sales Online Mgr Expenses Employee Manager HR Self Service Employee HR Self Service iProcurement Employee Expenses Mgr iProcurement Mgr Speaker Notes User Management introduces the role based access control. A key feature of this model is that all access is through roles. A role can be configured to consolidate responsibilities, permissions and data security rules that are required for users to perform a specific function. Access privileges are inherited based on the roles assigned to the user. Also, a user can be assigned several roles – for example a user can play a role of an employee as well as a part of the sales rep at the same time. Also, several users can play the same role at any given time. Once again, all the employees in an organization play the employee role  Users directly assigned Responsibilities Responsibility

..With RBAC: Basic Approach Sales Manager Employee Sales Rep Manager Expenses Employee HR Self Service Manager HR Self Service iProcurement Sales Online Speaker Notes User Management introduces the role based access control. A key feature of this model is that all access is through roles. A role can be configured to consolidate responsibilities, permissions and data security rules that are required for users to perform a specific function. Access privileges are inherited based on the roles assigned to the user. Also, a user can be assigned several roles – for example a user can play a role of an employee as well as a part of the sales rep at the same time. Also, several users can play the same role at any given time. Once again, all the employees in an organization play the employee role  Role Inheritance Role

RBAC Benefits Reduces / Simplifies Administration Mass updates via single operation Coexists with existing Security Setups Basic Approach: Try it now! Consolidate your existing Responsibilities into Roles Advanced Approach Reduces # Responsibilities and Menus “Principle of Least Privilege” The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre 11.5.10 and how the setup differs in 11.5.10 release

D E M O N S T R A T I O N RBAC

Provisioning Services Role Based Access Control Data Security Function Security

Provisioning Services Workflow based Provisioning Engine Handles all Self Service and Administrator initiated requests for new User Accounts and Roles / Responsibilities Reserve, Release, Activate Pending Accounts Temporary Storage of Registration Data “Registration Process” - Metadata that define: Approval Policies (in Oracle Approval Management) Eligibility Policies Email Verification (Account Requests only) Notification Workflows Business Logic Registration UI’s The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre 11.5.10 and how the setup differs in 11.5.10 release

Account Provisioning Flow The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre 11.5.10 and how the setup differs in 11.5.10 release

Delegated Administration Provisioning Services Role Based Access Control Data Security Function Security

Delegated Administration Local Administrator Americas System Administrator System Administrator All Users & Roles Local Administrator Subset of Users & Roles The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre 11.5.10 and how the setup differs in 11.5.10 release Local Administrator Europe

Delegated Administration Fine Grained Admin Policies based on Data Security Defines who can: [query, create, update, reset pwd] a given set of users Examples: Internal / External Users Location Organization Or anything else derived using SQL Granted to Admin Roles Leverages Provisioning Services (if set up) RBAC is not required (except for Admin Roles) The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre 11.5.10 and how the setup differs in 11.5.10 release

Delegated Admin Benefits Decentralized Administration Administrators closer to the users they manage System more likely to be up to date Improved response time The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre 11.5.10 and how the setup differs in 11.5.10 release

30

31

32

33

34

35

D E M O N S T R A T I O N Delegated Admin

Delegated Administration Self Service Features Delegated Administration Provisioning Services Role Based Access Control Data Security Function Security

Self Service Features End Users can request New User Accounts New Roles and Responsibilities From the “Access Requests” page (Preferences menu) Password Reset From AppsLogin page (set “Local Login Mask” profile) Leverages Provisioning Services Does not require RBAC The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre 11.5.10 and how the setup differs in 11.5.10 release

D E M O N S T R A T I O N Self Service Features

R12 Enhance for User Management Proxy User ICM (Separation of Duties – SoD) Integration Enhanced Forget Username/Password New Registration Process Type for Administrator Role Assignment Security Wizard Infrastructure Search Enhancement for List of Value’s (LOV) List of new/updated R12 features

Proxy User Description Proxy User Framework Provide the delegator the ability to grant/revoke the proxy privilege to individuals Provide a mechanism throughout the application’s framework where the user can access the proxy switcher feature Provide a mechanism throughout the application’s framework which indicates to the user that they are acting as a proxy Provide the ability to track the delegate’s actions within the system, while the delegate is acting on behalf of the delegator (Audit)

Proxy User Process - How to grant proxy privileges Grant proxy privileges to a user under Preferences -> Manage Proxies Example: SYSADMIN grants proxy privileges to KWALKER Ymtu5@ymtu.com

Proxy User Process – How to switch to proxy user - I “Switch User” link appears for the delegated user KWALKER

Proxy User Process – How to switch to proxy user - II Clicking on “Switch User” allows the user to select which user to act as proxy for

Proxy User Process – Framework chrome for proxy user All UI screens show the updated chrome for proxy user “Return to Self” link allows to switch back to regular user session

ICM (SoD) Integration Description Separation of Duties integration - ICM Oracle User Management (UMX) provides SoD (Segregation of Duties) functionality through integration with Oracle Internal Controls Manager (ICM) Preventative enforcement of SoD constraints At assignment time (admin flows) With Notifications (self service flows) Function security based constraint override for administrators

ICM (SoD) Integration Benefits Improve Regulatory Compliance Allows for preventative enforcement of separation of duties constraints as defined by regulatory requirements (SOX)

Enhanced Forgot Username/Password Forgot Username / Password Enhancements Centralized “Forgot Username/Password” capability Improved implementation by coupling of username and password retrieval (or reset) process “Forgot username” functionality introduced Enhanced “forgot password” functionality – allowing user to reset password Ability to query on either lost “username” or lost “password” Enter email address if lost username Enter username if lost password

New Registration Process Type for Administrator Role Assignment New registration process of type “Administrator Assisted Additional Access” Different policies (registration processes) can be used as administrative actions vs. self service requests for Approval Routing UI Notifications Business Logic

New Registration Process Type Benefits Reduce complexity Simpler registration processes can be created for self-service and administrator flavors Increase flexibility Support alternative approvals for administrator role assignment

Security Wizard Infrastructure Infrastructure for product teams to create their own security wizards in context of a role Product teams create their wizards and seed relevant information These wizards appear in list of security wizards available to the administrator when creating/updating role information New User Interface for Delegated Administration Existing functionality(11.5.10) of delegated administration setup implemented using wizard infrastructure Wizard guides the user through what options they can set for a delegated administration

Security Wizard Infrastructure Benefits Increase Ease of Use Wizard framework for managing security information Improved flexibility Wizard to guide user through delegation setup

Security Wizard Infrastructure Setup – Add function to wizard menu Seed the function for their wizard in the wizard menu - UMX_ROLE_WIZARD_LINKS_MENU

Security Wizard Infrastructure Setup – Create grant for their function Create grant for the function seeded in previous step for all the administrator roles that the wizard should be available to

Security Wizard Infrastructure Process – How to use the feature Security wizard can be launched from create/update role page

Security Wizard Infrastructure Process – How to use the feature Wizard launcher page lists available wizards to the logged in user Clicking on the icon launches the wizard in context of the role

Security Wizard Infrastructure Process – Delegated Admin Wizard UMX delegated admin wizard launched from the wizard launch page

Search Enhancements Description List of Values Search Enhancements Search Enhancement for LOVs (List of Values) All LOVs in User Management (UMX) searchable by Role Responsibility Both Internal Code A type included in the results – to differentiate roles and responsibilities

Search Enhancements Benefits Reduce Ambiguity Returning a type to reduce ambiguity between roles and responsibilities Increase Ease of Use Common LOV can be used to search roles, responsibilities or both

Search Enhancements Process - How to use the feature Search by name or code for role, responsibility or both

UMX Homepage http://www-apps.us.oracle.com:1100/umx/home/overview/

Q & A