Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2007, Oracle. All rights reserved. Implementing Role-Based Security.

Similar presentations


Presentation on theme: "Copyright © 2007, Oracle. All rights reserved. Implementing Role-Based Security."— Presentation transcript:

1 Copyright © 2007, Oracle. All rights reserved. Implementing Role-Based Security

2 Copyright © 2007, Oracle. All rights reserved. Objectives After completing this module, you should be able to: Discuss people, groups, and companies Manage organization-level roles Implement role-based security

3 Copyright © 2007, Oracle. All rights reserved. Agenda Managing people, groups, and companies Managing organization-level roles Implementing role-based security Summary

4 Copyright © 2007, Oracle. All rights reserved. Managing People, Groups, and Companies The Type attribute on the People Search Results and People Detail pages corresponds to the three types of People roles in the Product Lifecycle Management application: Internal Customer Vendor

5 Copyright © 2007, Oracle. All rights reserved. Agenda Managing people, groups, and companies Managing organization-level roles Implementing role-based security Summary

6 Copyright © 2007, Oracle. All rights reserved. Managing Organization-Level Roles You can grant a specific role to a certain person, group, or company that applies to all items in an organization. This is useful when you want to grant one person access to many items.

7 Copyright © 2007, Oracle. All rights reserved. Item Role Assignments Item roles are assigned to persons at the attribute group level. This secures view and edit privileges at the attribute level. Attribute Group Item roles are linked to persons for specific items. The access control is restricted at the item level. Item level Item roles are assigned to persons at the Item Catalog Category level. This secures item access by Item Catalog Category. Item Catalog Category level Item roles are assigned to persons at the Inventory Organization level. This controls item information access at the Organization level. Organization level

8 Copyright © 2007, Oracle. All rights reserved. Agenda Managing people, groups, and companies Managing organization-level roles Implementing role-based security Summary

9 Copyright © 2007, Oracle. All rights reserved. Role-Based Security Tasks include: Defining groups Implementing item catalog role-based security (required) Implementing catalog role-based security (required) Implementing change management role-based security (required)

10 Copyright © 2007, Oracle. All rights reserved. Advanced Security Solution Access Based On: Job Function Data Permissions Using Roles Role Types Privileges Role Assignments Advanced Security Unique View for Diesel Engines Division Unique View for Electric Motor Division Unique View forSuppliers PLM

11 Copyright © 2007, Oracle. All rights reserved. Building Role-Based Security ROLES Item Catalog Category Role Item Role Change Role Catalog Role Group Role Privileges Role Types Edit Privilege View Privilege All Users Company Group Persons Role Assignments

12 Copyright © 2007, Oracle. All rights reserved. Role Creation Process Create Item Role Assign Change Role Mapping Privileges Assign the Role to a person in an Organization Assign Privileges Map New Roles to Existing Seeded Change Object Roles

13 Copyright © 2007, Oracle. All rights reserved. Group Creation Process Create Group Name Assign Group Reviewer Role for Supplier Add Members

14 Copyright © 2007, Oracle. All rights reserved. Agenda Managing people, groups, and companies Managing organization-level roles Implementing role-based security Summary

15 Copyright © 2007, Oracle. All rights reserved. Summary In this module, you should have learned how to: Manage people, groups, and companies Manage organization-level roles Implement role-based security


Download ppt "Copyright © 2007, Oracle. All rights reserved. Implementing Role-Based Security."

Similar presentations


Ads by Google