edu3fb3y

26
Advanced Security Overview Copyright © Oracle, 2007. All rights reserved. Advanced Security document.doc Effective Paradigm_effective Page 1 of 26 Rev Paradigm_revision

Upload: kashinath09

Post on 11-Jul-2016

2 views

Category:

Documents


1 download

DESCRIPTION

EDUUUU

TRANSCRIPT

Page 1: EDU3FB3Y

Advanced SecurityOverview

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 1 of 20 Rev Paradigm_revision

Page 2: EDU3FB3Y

Advanced Security

System References

Distribution

Job Title*

Ownership

The Job Title [[email protected]?Subject=EDUxxxxx] is responsible for ensuring that this document is necessary and that it reflects actual practice.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 2 of 20 Rev Paradigm_revision

Page 3: EDU3FB3Y

Advanced Security

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 3 of 20 Rev Paradigm_revision

Page 4: EDU3FB3Y

Objectives

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 4 of 20 Rev Paradigm_revision

Page 5: EDU3FB3Y

Data Access Security for Legal Entities and Ledgers

Data Access Security for Legal Entities and LedgersData Access Sets are a security feature that enables you to grant and secure access to ledgers, or portions of the ledger, by its balancing segment values or management segment values.

• If a balancing segment value is assigned to a ledger, then you can secure access to specific balancing segment values.

• Furthermore, if you have balancing segment values assigned to a legal entity, then you can secure access to specific legal entities.

Data Access Set Types:• Full Ledger Access means you have access to the entire ledger.

- For example, this could mean read-only access to the entire ledger or both read and write access.

• Specific BSVs means you can only access one or more balancing segment values for that ledger.

- You can specify read-only, read and write access, or a combination of the two for different balancing segment values.

Notes:

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 5 of 20 Rev Paradigm_revision

Page 6: EDU3FB3Y

• Segment Value (Flexfield) Security Rules provide similar functionality. A key feature of Segment Value Security is general data access restriction within a responsibility.

• Data Access Sets provide more advanced configurations within a responsibility, because you can now have tailored access rules to multiple ledgers within the same responsibility.

- For example, you can block access to one segment for one ledger and allow access for the same segment in another ledger in the same responsibility for balancing and management segments.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 6 of 20 Rev Paradigm_revision

Page 7: EDU3FB3Y

Data Access Security for Legal Entities and Ledgers

Data Access Security for Legal Entities and LedgersBSV security adds an important aspect to multi-ledger processing. This aspect of Data Access Sets enables us to maintain more granular control for multi-ledger processing at the responsibility level. For example, while reviewing ledger sets, you can perform the following GL processes across multiple ledgers simultaneously:

• Opening and closing periods• Creating period-closing journals, mass allocations, and recurring journals• Translating balances• Viewing journals and balances using account inquiry• Financial Reporting, including both standard reports and FSG reports.

With BSV Data Access Security, you can prevent or limit access to certain processes. For example, you can generate recurring journals for a subset of BSVs for multiple ledgers in a ledger set. For cross-ledger operations, a responsibility with limited access to one BSV in a set of ledgers can still run FSG reports, but can only query data from the segments for which the responsibility has access.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 7 of 20 Rev Paradigm_revision

Page 8: EDU3FB3Y

Data Access Security for Legal Entities and Ledgers

Data Access Security for Legal Entities and LedgersIf you have read and write access to the entire ledger, then you can enter and post journals to all BSVs for the ledger. If you have read and write access to only some BSVs for the ledger, then you will only be able to enter and post journals for those BSVs. When viewing a journal, you only need read access to any of the BSVs contained in the journal lines. For journal lines which you do not have BSV access to those lines will not appear in the journal entry, but the credits and debits will still balance.When modifying a journal batch, you must have write access to all ledgers or BSVs that are used in that batch. You are allowed to change, reverse, tax, delete, and post a journal if you have write access to all of the ledger/BSV combinations in the batch. You can only update, approve, delete, or post a batch if you have write access to all of the ledger/BSV combinations in the batch.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 8 of 20 Rev Paradigm_revision

Page 9: EDU3FB3Y

Data Access Security for Legal Entities and Ledgers

Data Access Security for Legal Entities and LedgersA key point to keep in mind as we view the next few examples is that access is granted at the responsibility-level.Here is an example of a Data Access Set having full ledger access to a ledger. The ledger called US Corporate has three balancing segment values assigned to it that represent each of the three different legal entities for this ledger, US East, US West, and US South. Here we have specified read-only access on this ledger, so you will only be able to view existing journals, view balances, and view reports for all balancing segment values.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 9 of 20 Rev Paradigm_revision

Page 10: EDU3FB3Y

Data Access Security for Legal Entities and Ledgers

Data Access Security for Legal Entities and LedgersThis example shows a Data Access Set that secures access by BSVs. The same ledger called US Corporate is assigned to this Data Access Set. You can specify read-only access to BSV 01 that represents the US East Legal Entity, and you can specify read and write access to the other two balancing segment values for legal entities, US West and US South. Thus, for US East (BSV 01), you will only be able to view journals, view balances and view reports. You will not be able to enter journals or update balances for BSV 01. On the other hand, for BSVs 02 and 03, in which you have full read and write access, you can enter and post journals, view and update balances, and view and run reports for those balancing segment values.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 10 of 20 Rev Paradigm_revision

Page 11: EDU3FB3Y

Data Access Security for Legal Entities and Ledgers

Data Access Security for Legal Entities and LedgersBy assigning more than one ledger to a Data Access Set, you can access multiple ledgers from a single responsibility. Here, we have assigned two ledgers to the Data Access Set, the EMEA ledger and the APAC ledger. By assigning read and write privileges to both ledgers, you will be able to view, enter and post journals, view and update balances, and view and run reports for both ledgers. You can also secure each ledger by assigning read-only or read and write access to different ledgers assigned to the same Data Access Set. The emphasis here is that we can specify both broader access to multiple ledgers and more granular access by restricting access to specific BSVs.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 11 of 20 Rev Paradigm_revision

Page 12: EDU3FB3Y

Setup and Process

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 12 of 20 Rev Paradigm_revision

Page 13: EDU3FB3Y

Data Access Security for Legal Entities and Ledgers Setup and Process

Data Access Security for Legal Entities and LedgersSetup and Process

The setup for the security aspect of Data Access Sets is the same as we saw earlier.You manually define a Data Access Set and tailor it to your needs, or use the system-generated Data Access Sets.Again, if you have more than GL responsibility assigned to a particular user, each responsibility for the particular user has access to the superset of all combined Data Access Sets assigned to the user’s responsibilities.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 13 of 20 Rev Paradigm_revision

Page 14: EDU3FB3Y

Data Access Security for Legal Entities and Ledgers Setup - Define Data Access Set

Data Access Security for Legal Entities and LedgersSetup - Define Data Access Set

(N) Setup : Financials : Data Access SetsNotice the Access Set Type field. There are three options:

• Full Ledger• Balancing Segment Value• Management Segment Value

Each Data Access Set must be of one of these access set types. Depending on the Access Set Type, you can assign more specific access restrictions, such as to specific business segment or management segment values.To specify BSV levels of data access granularity, the Access Set Type must be set accordingly and the corresponding BSVs specified in the Specific column under Access Details > Values.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 14 of 20 Rev Paradigm_revision

Page 15: EDU3FB3Y

Management Reporting and Security

Management Reporting and SecurityIn Release 12, a new type of segment qualifier has been added, a management segment qualifier. You can assign this to a segment in which you want to perform management reporting and analysis. For example, you can include a Cost Center, a Line of Business, or a Product Line because they tend to have managers assigned to them. If you choose a management segment, you can use data access sets to limit access to specific management segment values.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 15 of 20 Rev Paradigm_revision

Page 16: EDU3FB3Y

Management Reporting and Security

Management Reporting and SecurityAbove is an example of how the management segment may be used. This is the cost center organizational hierarchy. Director A has cost center OU97, Director B has OS69 and Director C has OX53. Assume Director A and his counterparts are very competitive with each other and they’re always competing on who has the lowest expenses and who gets the higher budgets, etc. By assigning the cost center segment as the management segment, we can secure read and write access to certain management segment values based on cost center manager.

• For example, Director A may have read and write access to only his cost center enabling him to modify budget amounts or expense items and view his results in management reports.

• Director A would not have access to Director B or Director C’s cost center or to Vice President's cost center (which most likely is a parent value of all of his direct reports).

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 16 of 20 Rev Paradigm_revision

Page 17: EDU3FB3Y

Management Reporting and Security

Management Reporting and SecurityOn the other hand, the Vice President would have full read and write access to his cost center 0683 which is the parent of his direct reports Child cost center:

• Director A OU97• Director B OS69• Director C OX53

The VP has full access to all of his direct reports’ data. Having access to the parent account will allow access to child data.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 17 of 20 Rev Paradigm_revision

Page 18: EDU3FB3Y

Management Reporting and Security

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 18 of 20 Rev Paradigm_revision

Page 19: EDU3FB3Y

Management Reporting and Security Setup

Management Reporting and Security Setup• Select a segment of your chart of accounts to designate as your management segment.• Define a data access set secured by management segment values within a ledger or across

ledgers in a ledger set.• Assign the data access set to a responsibility, and the security will take effect for that

responsibility.• This is available in all applications that use data access sets.Note: The management segment can be any segment except the balancing segment, natural account segment or intercompany segment.

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 19 of 20 Rev Paradigm_revision

Page 20: EDU3FB3Y

Summary

Copyright © Oracle, 2007. All rights reserved.

Advanced Security document.docEffective Paradigm_effective Page 20 of 20 Rev Paradigm_revision