Oracle Fusion Security – Live Training (Dec-25)

Current Status

Not Enrolled

Price

Included with OEG One

Get Started

Oracle Fusion Security Contents
# Oracle Fusion Security Contents Day Week
1Introduction to Oracle Fusion SecurityDay-1W-1
Concepts of Security in Oracle FusionDay-1W-1
What is RBAC (Role-Based Access Control)Day-1W-1
Segregation of Duties (SoD) and ComplianceDay-1W-1
Security Layers: Functional Security vs. Data SecurityDay-1W-1
2Users in FusionDay-1W-1
Types of UsersDay-1W-1
Internal vs. External UsersDay-1W-1
User Lifecycle in FusionDay-1W-1
Business Users – Employees, Finance staff, SCM staff, etc.Day-1W-1
Implementation Users – Application Implementation ConsultantsDay-1W-1
IT / Security Admin Users – Role administrators, identity managersDay-1W-1
External Users – Suppliers (Supplier Portal Accounts), CustomersDay-1W-1
User Creation & AdministrationDay-2W-1
Creating Users in Security ConsoleDay-2W-1
Assigning Initial Roles during User CreationDay-2W-1
Password Policies and Reset ProceduresDay-2W-1
Managing Inactive Users and Expired PasswordsDay-2W-1
User CategoriesDay-2W-1
Segregating users by category (Employee, Contingent Worker, Supplier, etc.)Day-2W-1
Best practices for managing large user basesDay-2W-1
3Roles in FusionDay-3W-2
Role TypesDay-3W-2
Job Roles – Define business responsibilities (e.g., Accounts Payable Specialist, Procurement Buyer)Day-3W-2
Duty Roles – Contain specific privileges (e.g., Manage Invoices, Manage Purchase Orders)Day-3W-2
Abstract Roles – Common to all users (Employee)Day-3W-2
Discretionary Roles – Optional roles assigned on demandDay-3W-2
PrivilegesDay-3W-2
Functional Privileges – Define tasks (e.g., Create Payables Invoice)Day-3W-2
Data Security Privileges – Define scope of access (e.g., Business Unit, Inventory org.)Day-3W-2
Role AdministrationDay-3W-2
Assigning Seeded Roles to UsersDay-3W-2
Creating Custom Roles for Business NeedsDay-3W-2
Assigning Privileges to Custom Roles (functional & data)Day-3W-2
Using Role Provisioning Rules for automatic assignmentDay-3W-2
Role Lifecycle ManagementDay-3W-2
Copying/Duplicating Roles for customizationDay-3W-2
Comparing Roles (to check differences between seeded and custom roles)Day-3W-2
Role Synchronization Scheduled ProcessesDay-3W-2
Periodic Role Review and GovernanceDay-3W-2
4Data AccessDay-4W-2
Data Security ConceptsDay-4W-2
Security Contexts (Ledger, Business Unit, Inventory Org, Project Unit)Day-4W-2
Linking Roles with Data AccessDay-4W-2
Data Provisioning ApproachesDay-4W-2
Manual Assignment – Manage Data Access for UsersDay-4W-2
Bulk Assignment – Upload via ADFDIDay-4W-2
Automated Assignment – Using Data Provisioning RulesDay-4W-2
Special Security SetupsDay-4W-2
Procurement Agents – Data access for Buyers, Category ManagersDay-4W-2
5Security Console AdministrationDay-4W-2
OverviewDay-4W-2
Features of the Security ConsoleDay-4W-2
Role and User Management CapabilitiesDay-4W-2
User AdministrationDay-4W-2
Reset PasswordsDay-4W-2
Delete or Lock User AccountsDay-4W-2
Configure User Notification SettingsDay-4W-2
Security ConfigurationDay-4W-2
Location-Based Access (restrict by IP/location)Day-4W-2
Password Policies and Multi-Factor Authentication (MFA) if enabledDay-4W-2
Analytics Dashboard for security insightsDay-4W-2
6Security Reporting & AuditingDay-5W-3
Standard ReportsDay-5W-3
User Role Membership ReportDay-5W-3
Password Expiry ReportDay-5W-3
User and Role Access Audit ReportDay-5W-3
Inactive Users ReportDay-5W-3
Audit and ComplianceDay-5W-3
Segregation of Duties (SoD) conflict identificationDay-5W-3
Internal audit and external compliance supportDay-5W-3
Tracking role changes and provisioning activitiesDay-5W-3
7Export & Import of Security Setup DataDay-5W-3
Exporting Security SetupDay-5W-3
Export of Security Console configurationsDay-5W-3
Export of custom roles for migrationDay-5W-3
Importing Security SetupDay-5W-3
Importing into new environments (e.g., from TEST to PROD)Day-5W-3
Best practices for controlled migrationDay-5W-3
Version management of roles and security policiesDay-5W-3
8Best Practices & GovernanceDay-6W-3
Principle of Least Privilege (give minimum required access)Day-6W-3
Role Customization Guidelines (avoid direct modification of seeded roles)Day-6W-3
Periodic Role and User Access ReviewDay-6W-3
Automating Provisioning with Role and Data Provisioning RulesDay-6W-3
Security Governance Framework for Oracle FusionDay-6W-3

(You are not logged in. You need to login to access the videos.)

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
Shopping Cart
Feedback

How would you rate your experience on OracleErpGuide.com?

Poor Amazing
Feedback (optional)

How would you rate your purchase experience today?

Poor Amazing

Where did you first learn about us?