Current Status
Not Enrolled
Enroll in this course to get access
Price
Included with OEG One
Get Started
| # | Oracle Fusion Security Contents | Day | Week |
|---|---|---|---|
| 1 | Introduction to Oracle Fusion Security | Day-1 | W-1 |
| Concepts of Security in Oracle Fusion | Day-1 | W-1 | |
| What is RBAC (Role-Based Access Control) | Day-1 | W-1 | |
| Segregation of Duties (SoD) and Compliance | Day-1 | W-1 | |
| Security Layers: Functional Security vs. Data Security | Day-1 | W-1 | |
| 2 | Users in Fusion | Day-1 | W-1 |
| Types of Users | Day-1 | W-1 | |
| Internal vs. External Users | Day-1 | W-1 | |
| User Lifecycle in Fusion | Day-1 | W-1 | |
| Business Users – Employees, Finance staff, SCM staff, etc. | Day-1 | W-1 | |
| Implementation Users – Application Implementation Consultants | Day-1 | W-1 | |
| IT / Security Admin Users – Role administrators, identity managers | Day-1 | W-1 | |
| External Users – Suppliers (Supplier Portal Accounts), Customers | Day-1 | W-1 | |
| User Creation & Administration | Day-2 | W-1 | |
| Creating Users in Security Console | Day-2 | W-1 | |
| Assigning Initial Roles during User Creation | Day-2 | W-1 | |
| Password Policies and Reset Procedures | Day-2 | W-1 | |
| Managing Inactive Users and Expired Passwords | Day-2 | W-1 | |
| User Categories | Day-2 | W-1 | |
| Segregating users by category (Employee, Contingent Worker, Supplier, etc.) | Day-2 | W-1 | |
| Best practices for managing large user bases | Day-2 | W-1 | |
| 3 | Roles in Fusion | Day-3 | W-2 |
| Role Types | Day-3 | W-2 | |
| Job Roles – Define business responsibilities (e.g., Accounts Payable Specialist, Procurement Buyer) | Day-3 | W-2 | |
| Duty Roles – Contain specific privileges (e.g., Manage Invoices, Manage Purchase Orders) | Day-3 | W-2 | |
| Abstract Roles – Common to all users (Employee) | Day-3 | W-2 | |
| Discretionary Roles – Optional roles assigned on demand | Day-3 | W-2 | |
| Privileges | Day-3 | W-2 | |
| Functional Privileges – Define tasks (e.g., Create Payables Invoice) | Day-3 | W-2 | |
| Data Security Privileges – Define scope of access (e.g., Business Unit, Inventory org.) | Day-3 | W-2 | |
| Role Administration | Day-3 | W-2 | |
| Assigning Seeded Roles to Users | Day-3 | W-2 | |
| Creating Custom Roles for Business Needs | Day-3 | W-2 | |
| Assigning Privileges to Custom Roles (functional & data) | Day-3 | W-2 | |
| Using Role Provisioning Rules for automatic assignment | Day-3 | W-2 | |
| Role Lifecycle Management | Day-3 | W-2 | |
| Copying/Duplicating Roles for customization | Day-3 | W-2 | |
| Comparing Roles (to check differences between seeded and custom roles) | Day-3 | W-2 | |
| Role Synchronization Scheduled Processes | Day-3 | W-2 | |
| Periodic Role Review and Governance | Day-3 | W-2 | |
| 4 | Data Access | Day-4 | W-2 |
| Data Security Concepts | Day-4 | W-2 | |
| Security Contexts (Ledger, Business Unit, Inventory Org, Project Unit) | Day-4 | W-2 | |
| Linking Roles with Data Access | Day-4 | W-2 | |
| Data Provisioning Approaches | Day-4 | W-2 | |
| Manual Assignment – Manage Data Access for Users | Day-4 | W-2 | |
| Bulk Assignment – Upload via ADFDI | Day-4 | W-2 | |
| Automated Assignment – Using Data Provisioning Rules | Day-4 | W-2 | |
| Special Security Setups | Day-4 | W-2 | |
| Procurement Agents – Data access for Buyers, Category Managers | Day-4 | W-2 | |
| 5 | Security Console Administration | Day-4 | W-2 |
| Overview | Day-4 | W-2 | |
| Features of the Security Console | Day-4 | W-2 | |
| Role and User Management Capabilities | Day-4 | W-2 | |
| User Administration | Day-4 | W-2 | |
| Reset Passwords | Day-4 | W-2 | |
| Delete or Lock User Accounts | Day-4 | W-2 | |
| Configure User Notification Settings | Day-4 | W-2 | |
| Security Configuration | Day-4 | W-2 | |
| Location-Based Access (restrict by IP/location) | Day-4 | W-2 | |
| Password Policies and Multi-Factor Authentication (MFA) if enabled | Day-4 | W-2 | |
| Analytics Dashboard for security insights | Day-4 | W-2 | |
| 6 | Security Reporting & Auditing | Day-5 | W-3 |
| Standard Reports | Day-5 | W-3 | |
| User Role Membership Report | Day-5 | W-3 | |
| Password Expiry Report | Day-5 | W-3 | |
| User and Role Access Audit Report | Day-5 | W-3 | |
| Inactive Users Report | Day-5 | W-3 | |
| Audit and Compliance | Day-5 | W-3 | |
| Segregation of Duties (SoD) conflict identification | Day-5 | W-3 | |
| Internal audit and external compliance support | Day-5 | W-3 | |
| Tracking role changes and provisioning activities | Day-5 | W-3 | |
| 7 | Export & Import of Security Setup Data | Day-5 | W-3 |
| Exporting Security Setup | Day-5 | W-3 | |
| Export of Security Console configurations | Day-5 | W-3 | |
| Export of custom roles for migration | Day-5 | W-3 | |
| Importing Security Setup | Day-5 | W-3 | |
| Importing into new environments (e.g., from TEST to PROD) | Day-5 | W-3 | |
| Best practices for controlled migration | Day-5 | W-3 | |
| Version management of roles and security policies | Day-5 | W-3 | |
| 8 | Best Practices & Governance | Day-6 | W-3 |
| Principle of Least Privilege (give minimum required access) | Day-6 | W-3 | |
| Role Customization Guidelines (avoid direct modification of seeded roles) | Day-6 | W-3 | |
| Periodic Role and User Access Review | Day-6 | W-3 | |
| Automating Provisioning with Role and Data Provisioning Rules | Day-6 | W-3 | |
| Security Governance Framework for Oracle Fusion | Day-6 | W-3 |
If you have a paid account, login here.
(You are not logged in. You need to login to access the videos.)
- Login
