Download presentation
Published byFlorence Fields Modified over 9 years ago
1
Leon Tu Applications Technology Group Oracle Corporation
Security Administration in Oracle E-Business Suite: Overview of Oracle User Management Leon Tu Applications Technology Group Oracle Corporation
2
Business Needs for User Management
Unified approach to create and maintain users Improved Security Easier User Administration The Oracle E-business Suite consists of several self-service applications. These applications generally require users to authenticate themselves before they can perform certain tasks such as purchase items from an online store, or create a service request. To be able to use these applications, specific user information may be required. For example, the online store requires the user’s credit card information for purchasing items, while information related to user’s orders may be required to complete a service request. Obviously, creating application-specific users is not a viable solution. Our goal in User Management is to provide a unified approach to creating users which reduces redundancy, simplifies maintenance and results in improved user experience. The E-Business Suite also needs to address important security considerations. For example, what applications can a user access? What functions can the user perform? What role does a user play in the system, and what data can the user access? These and other security issues must be addressed in a manner that is easy to setup, maintain, and use. The overall maintenance and administration of users must be easy and should involve few, if any, manual processes. In addition, administrators must be able to delegate their responsibilities to local administrators who have limited administrative privileges for a subset of their organization’s users. Oracle User Management attempts to address all these important business needs. Provide Delegation Capabilities
3
Oracle User Management
Self Service Features Delegated Administration Provisioning Services Role Based Access Control Data Security Function Security
4
Function Security
5
Function Security Functions represent basic entry points / operations / secured resources that do not have any data context, for example: “Page X” “Region Y” Typically done using responsibilities in Ebusiness suite Employee HR Self Service Manager HR Self Service Hiring / Firing Transfers Promotions Compensation Personal Info Job Posts Pay Slip
6
Data Security Function Security
7
Data Security What business objects / documents hold sensitive data & need to be secured For example: Expense Reports, Employees What secured operations can be performed on each object For example: update, delete, reject, approve, escalate Secured operations are represented as privileges aka permissions Authorization Policy: grant [someone] access to perform [a set of operations] on a given [set of business documents]: [Managers] can [view, approve, reject, update] [expense reports] [filed by their direct reports] Sets of business documents are identified through Object(instance sets (SQL predicates))
8
Data Security Grants Data security grants are only in effect when working on records which meet a filter criteria. Data filter types: Single instance (ad-hoc) Applies to a specific instance of an object "John may manage project 123" Instance set (policy) Applies to rows which match a WHERE clause "Employees may view public projects“ “Where project_status_flag = ‘PUB’”
9
Data Security Service Data security grants hold access policies
Application maintains a context User context: user identity and derived attributes Data context: data record that is “in focus” Data security service answers questions Which records can I perform a given function on Which functions can I perform on a given record Application restricts access accordingly Limited uptake right now (manual coding) Will be built into the framework (automatic) later
10
Role Based Access Control
Data Security Function Security
11
Role Based Access Control
RBAC standard (ANSI INCITS ) A role consists of Other roles (via inheritance) Responsibilities (via inheritance) Permissions Function Security Policies Data Security Policies A user can be assigned with several roles A role can be assigned to several users Speaker Notes User Management introduces the role based access control. A key feature of this model is that all access is through roles. A role can be configured to consolidate responsibilities, permissions and data security rules that are required for users to perform a specific function. Access privileges are inherited based on the roles assigned to the user. Also, a user can be assigned several roles – for example a user can play a role of an employee as well as a part of the sales rep at the same time. Also, several users can play the same role at any given time. Once again, all the employees in an organization play the employee role
12
EBS RBAC Model - Users Users can be: Humans Internal: Employees
External: Customers Systems Internal: integrated applications (A2A) External: trading partners (B2B) User User User User User User
13
EBS RBAC Model - Roles Roles can be: EBS Responsibilities HR Positions
User User Role Roles can be: EBS Responsibilities HR Positions TCA Groups LDAP Roles UMX Access Roles Hierarchical User User Role Role User User Role User User Role
14
EBS RBAC Model - Permissions
User Permission User Role Permission Permissions can be: Screens/Flows APIs/Services Data Operations User Permission User Role Role Permission User Permission User Role Permission User Permission User Role Permission
15
EBS RBAC Model - Permission Sets
User Permission User Role Set Permission User Permission Sets are defined using the Menu structure Permission User Role Role Permission User Set Permission User Role Permission Set User Permission Set User Role Permission
16
EBS RBAC Model - Grants User Permission User Role Set Permission User
17
EBS RBAC Model - Grants Grants represent security policies
Gives a role access to a set of permissions With optional context restriction Responsibility Organization Data set Some permissions are "context independent" Grants represent security policies "Employees have access to expense reporting" You should not to worry about navigation menus when defining security policy...
18
Case Study Grant access to a set of Sales Managers Need access to:
HR Self Service Manager + Employee access Sales Online Sales Manager access Expenses iProcurement The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre and how the setup differs in release
19
Access Control before.. Users directly assigned Responsibilities
Sales Online Mgr Expenses Employee Manager HR Self Service Employee HR Self Service iProcurement Employee Expenses Mgr iProcurement Mgr Speaker Notes User Management introduces the role based access control. A key feature of this model is that all access is through roles. A role can be configured to consolidate responsibilities, permissions and data security rules that are required for users to perform a specific function. Access privileges are inherited based on the roles assigned to the user. Also, a user can be assigned several roles – for example a user can play a role of an employee as well as a part of the sales rep at the same time. Also, several users can play the same role at any given time. Once again, all the employees in an organization play the employee role Users directly assigned Responsibilities Responsibility
20
..With RBAC: Basic Approach
Sales Manager Employee Sales Rep Manager Expenses Employee HR Self Service Manager HR Self Service iProcurement Sales Online Speaker Notes User Management introduces the role based access control. A key feature of this model is that all access is through roles. A role can be configured to consolidate responsibilities, permissions and data security rules that are required for users to perform a specific function. Access privileges are inherited based on the roles assigned to the user. Also, a user can be assigned several roles – for example a user can play a role of an employee as well as a part of the sales rep at the same time. Also, several users can play the same role at any given time. Once again, all the employees in an organization play the employee role Role Inheritance Role
21
RBAC Benefits Reduces / Simplifies Administration
Mass updates via single operation Coexists with existing Security Setups Basic Approach: Try it now! Consolidate your existing Responsibilities into Roles Advanced Approach Reduces # Responsibilities and Menus “Principle of Least Privilege” The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre and how the setup differs in release
22
D E M O N S T R A T I O N RBAC
23
Provisioning Services
Role Based Access Control Data Security Function Security
24
Provisioning Services
Workflow based Provisioning Engine Handles all Self Service and Administrator initiated requests for new User Accounts and Roles / Responsibilities Reserve, Release, Activate Pending Accounts Temporary Storage of Registration Data “Registration Process” - Metadata that define: Approval Policies (in Oracle Approval Management) Eligibility Policies Verification (Account Requests only) Notification Workflows Business Logic Registration UI’s The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre and how the setup differs in release
25
Account Provisioning Flow
The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre and how the setup differs in release
26
Delegated Administration
Provisioning Services Role Based Access Control Data Security Function Security
27
Delegated Administration
Local Administrator Americas System Administrator System Administrator All Users & Roles Local Administrator Subset of Users & Roles The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre and how the setup differs in release Local Administrator Europe
28
Delegated Administration
Fine Grained Admin Policies based on Data Security Defines who can: [query, create, update, reset pwd] a given set of users Examples: Internal / External Users Location Organization Or anything else derived using SQL Granted to Admin Roles Leverages Provisioning Services (if set up) RBAC is not required (except for Admin Roles) The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre and how the setup differs in release
29
Delegated Admin Benefits
Decentralized Administration Administrators closer to the users they manage System more likely to be up to date Improved response time The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre and how the setup differs in release
30
30
31
31
32
32
33
33
34
34
35
35
36
D E M O N S T R A T I O N Delegated Admin
37
Delegated Administration
Self Service Features Delegated Administration Provisioning Services Role Based Access Control Data Security Function Security
38
Self Service Features End Users can request
New User Accounts New Roles and Responsibilities From the “Access Requests” page (Preferences menu) Password Reset From AppsLogin page (set “Local Login Mask” profile) Leverages Provisioning Services Does not require RBAC The next few slides will take you through a simple set up process of some roles / responsibilities. We will see how an employee, sales rep, sales mgr, support mgr can be set up pre and how the setup differs in release
39
D E M O N S T R A T I O N Self Service Features
40
R12 Enhance for User Management
Proxy User ICM (Separation of Duties – SoD) Integration Enhanced Forget Username/Password New Registration Process Type for Administrator Role Assignment Security Wizard Infrastructure Search Enhancement for List of Value’s (LOV) List of new/updated R12 features
41
Proxy User Description
Proxy User Framework Provide the delegator the ability to grant/revoke the proxy privilege to individuals Provide a mechanism throughout the application’s framework where the user can access the proxy switcher feature Provide a mechanism throughout the application’s framework which indicates to the user that they are acting as a proxy Provide the ability to track the delegate’s actions within the system, while the delegate is acting on behalf of the delegator (Audit)
42
Proxy User Process - How to grant proxy privileges
Grant proxy privileges to a user under Preferences -> Manage Proxies Example: SYSADMIN grants proxy privileges to KWALKER
43
Proxy User Process – How to switch to proxy user - I
“Switch User” link appears for the delegated user KWALKER
44
Proxy User Process – How to switch to proxy user - II
Clicking on “Switch User” allows the user to select which user to act as proxy for
45
Proxy User Process – Framework chrome for proxy user
All UI screens show the updated chrome for proxy user “Return to Self” link allows to switch back to regular user session
46
ICM (SoD) Integration Description
Separation of Duties integration - ICM Oracle User Management (UMX) provides SoD (Segregation of Duties) functionality through integration with Oracle Internal Controls Manager (ICM) Preventative enforcement of SoD constraints At assignment time (admin flows) With Notifications (self service flows) Function security based constraint override for administrators
47
ICM (SoD) Integration Benefits
Improve Regulatory Compliance Allows for preventative enforcement of separation of duties constraints as defined by regulatory requirements (SOX)
48
Enhanced Forgot Username/Password
Forgot Username / Password Enhancements Centralized “Forgot Username/Password” capability Improved implementation by coupling of username and password retrieval (or reset) process “Forgot username” functionality introduced Enhanced “forgot password” functionality – allowing user to reset password Ability to query on either lost “username” or lost “password” Enter address if lost username Enter username if lost password
49
New Registration Process Type for Administrator Role Assignment
New registration process of type “Administrator Assisted Additional Access” Different policies (registration processes) can be used as administrative actions vs. self service requests for Approval Routing UI Notifications Business Logic
50
New Registration Process Type Benefits
Reduce complexity Simpler registration processes can be created for self-service and administrator flavors Increase flexibility Support alternative approvals for administrator role assignment
51
Security Wizard Infrastructure
Infrastructure for product teams to create their own security wizards in context of a role Product teams create their wizards and seed relevant information These wizards appear in list of security wizards available to the administrator when creating/updating role information New User Interface for Delegated Administration Existing functionality( ) of delegated administration setup implemented using wizard infrastructure Wizard guides the user through what options they can set for a delegated administration
52
Security Wizard Infrastructure Benefits
Increase Ease of Use Wizard framework for managing security information Improved flexibility Wizard to guide user through delegation setup
53
Security Wizard Infrastructure Setup – Add function to wizard menu
Seed the function for their wizard in the wizard menu - UMX_ROLE_WIZARD_LINKS_MENU
54
Security Wizard Infrastructure Setup – Create grant for their function
Create grant for the function seeded in previous step for all the administrator roles that the wizard should be available to
55
Security Wizard Infrastructure Process – How to use the feature
Security wizard can be launched from create/update role page
56
Security Wizard Infrastructure Process – How to use the feature
Wizard launcher page lists available wizards to the logged in user Clicking on the icon launches the wizard in context of the role
57
Security Wizard Infrastructure Process – Delegated Admin Wizard
UMX delegated admin wizard launched from the wizard launch page
58
Search Enhancements Description
List of Values Search Enhancements Search Enhancement for LOVs (List of Values) All LOVs in User Management (UMX) searchable by Role Responsibility Both Internal Code A type included in the results – to differentiate roles and responsibilities
59
Search Enhancements Benefits
Reduce Ambiguity Returning a type to reduce ambiguity between roles and responsibilities Increase Ease of Use Common LOV can be used to search roles, responsibilities or both
60
Search Enhancements Process - How to use the feature
Search by name or code for role, responsibility or both
61
UMX Homepage
62
Q & A
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.