Oracle Fusion Security – Live Training (Dec-25)

Current Status

Not Enrolled

Price

Included with OEG One

Get Started

Dates and Timings
Download Schedule (.ics)
Oracle Fusion Security Contents
# Oracle Fusion Security Contents Day Week
1Introduction to Oracle Fusion SecurityDay-1W-1
Concepts of Security in Oracle FusionDay-1W-1
What is RBAC (Role-Based Access Control)Day-1W-1
Segregation of Duties (SoD) and ComplianceDay-1W-1
Security Layers: Functional Security vs. Data SecurityDay-1W-1
2Users in FusionDay-1W-1
Types of UsersDay-1W-1
Internal vs. External UsersDay-1W-1
User Lifecycle in FusionDay-1W-1
Business Users – Employees, Finance staff, SCM staff, etc.Day-1W-1
Implementation Users – Application Implementation ConsultantsDay-1W-1
IT / Security Admin Users – Role administrators, identity managersDay-1W-1
External Users – Suppliers (Supplier Portal Accounts), CustomersDay-1W-1
User Creation & AdministrationDay-2W-1
Creating Users in Security ConsoleDay-2W-1
Assigning Initial Roles during User CreationDay-2W-1
Password Policies and Reset ProceduresDay-2W-1
Managing Inactive Users and Expired PasswordsDay-2W-1
User CategoriesDay-2W-1
Segregating users by category (Employee, Contingent Worker, Supplier, etc.)Day-2W-1
Best practices for managing large user basesDay-2W-1
3Roles in FusionDay-3W-2
Role TypesDay-3W-2
Job Roles – Define business responsibilities (e.g., Accounts Payable Specialist, Procurement Buyer)Day-3W-2
Duty Roles – Contain specific privileges (e.g., Manage Invoices, Manage Purchase Orders)Day-3W-2
Abstract Roles – Common to all users (Employee)Day-3W-2
Discretionary Roles – Optional roles assigned on demandDay-3W-2
PrivilegesDay-3W-2
Functional Privileges – Define tasks (e.g., Create Payables Invoice)Day-3W-2
Data Security Privileges – Define scope of access (e.g., Business Unit, Inventory org.)Day-3W-2
Role AdministrationDay-3W-2
Assigning Seeded Roles to UsersDay-3W-2
Creating Custom Roles for Business NeedsDay-3W-2
Assigning Privileges to Custom Roles (functional & data)Day-3W-2
Using Role Provisioning Rules for automatic assignmentDay-3W-2
Role Lifecycle ManagementDay-3W-2
Copying/Duplicating Roles for customizationDay-3W-2
Comparing Roles (to check differences between seeded and custom roles)Day-3W-2
Role Synchronization Scheduled ProcessesDay-3W-2
Periodic Role Review and GovernanceDay-3W-2
4Data AccessDay-4W-2
Data Security ConceptsDay-4W-2
Security Contexts (Ledger, Business Unit, Inventory Org, Project Unit)Day-4W-2
Linking Roles with Data AccessDay-4W-2
Data Provisioning ApproachesDay-4W-2
Manual Assignment – Manage Data Access for UsersDay-4W-2
Bulk Assignment – Upload via ADFDIDay-4W-2
Automated Assignment – Using Data Provisioning RulesDay-4W-2
Special Security SetupsDay-4W-2
Procurement Agents – Data access for Buyers, Category ManagersDay-4W-2
5Security Console AdministrationDay-4W-2
OverviewDay-4W-2
Features of the Security ConsoleDay-4W-2
Role and User Management CapabilitiesDay-4W-2
User AdministrationDay-4W-2
Reset PasswordsDay-4W-2
Delete or Lock User AccountsDay-4W-2
Configure User Notification SettingsDay-4W-2
Security ConfigurationDay-4W-2
Location-Based Access (restrict by IP/location)Day-4W-2
Password Policies and Multi-Factor Authentication (MFA) if enabledDay-4W-2
Analytics Dashboard for security insightsDay-4W-2
6Security Reporting & AuditingDay-5W-3
Standard ReportsDay-5W-3
User Role Membership ReportDay-5W-3
Password Expiry ReportDay-5W-3
User and Role Access Audit ReportDay-5W-3
Inactive Users ReportDay-5W-3
Audit and ComplianceDay-5W-3
Segregation of Duties (SoD) conflict identificationDay-5W-3
Internal audit and external compliance supportDay-5W-3
Tracking role changes and provisioning activitiesDay-5W-3
7Export & Import of Security Setup DataDay-5W-3
Exporting Security SetupDay-5W-3
Export of Security Console configurationsDay-5W-3
Export of custom roles for migrationDay-5W-3
Importing Security SetupDay-5W-3
Importing into new environments (e.g., from TEST to PROD)Day-5W-3
Best practices for controlled migrationDay-5W-3
Version management of roles and security policiesDay-5W-3
8Best Practices & GovernanceDay-6W-3
Principle of Least Privilege (give minimum required access)Day-6W-3
Role Customization Guidelines (avoid direct modification of seeded roles)Day-6W-3
Periodic Role and User Access ReviewDay-6W-3
Automating Provisioning with Role and Data Provisioning RulesDay-6W-3
Security Governance Framework for Oracle FusionDay-6W-3

(You are not logged in. You need to login to access the videos.)

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.

Course Content

Meeting Invite
Meeting Invite | Oracle Fusion Security | Live Training
Training Material
Training Material | Fusion Security Live Training 1 Topic
Lesson Content
0% Complete 0/1 Steps
Training Recordings
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Shopping Cart