securing erp erp cloud - docs.· oracle erp cloud securing erp chapter 1 introduction 1 1...

Download Securing ERP ERP Cloud - docs.· Oracle ERP Cloud Securing ERP Chapter 1 Introduction 1 1 Introduction

Post on 09-Apr-2019

216 views

Category:

Documents

2 download

Embed Size (px)

TRANSCRIPT

OracleERP CloudSecuring ERP

Release 13 (update 18B)

Oracle ERP CloudSecuring ERP

Release 13 (update 18B)Part Number E94713-02Copyright 2011-2018, Oracle and/or its affiliates. All rights reserved.

Authors: Rakhi Banerjee, Alvin Law, Charlie Frakes, Abhishek Majumder, P. S. G. V. Sekhar, Angie Shahi

This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected byintellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast,modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, ordecompilation of this software, unless required by law for interoperability, is prohibited.

The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them tous in writing.

If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then thefollowing notice is applicable:

U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulationand agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operatingsystem, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictionsapplicable to the programs. No other rights are granted to the U.S. Government.

This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use inany inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerousapplications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. OracleCorporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks orregistered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks ofAdvanced Micro Devices. UNIX is a registered trademark of The Open Group.

This software or hardware and documentation may provide access to or information about content, products, and services from third parties. OracleCorporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, andservices unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for anyloss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreementbetween you and Oracle.

The business names used in this documentation are fictitious, and are not intended to identify any real companies currently or previously in existence.

Oracle ERP CloudSecuring ERP

Contents

Preface i

1 Introduction 1Securing Oracle ERP Cloud: Overview ...................................................................................................................... 1

Implementing ERP Security: Overview ...................................................................................................................... 2

Role Types: Explained .............................................................................................................................................. 3

Role Inheritance: Explained ....................................................................................................................................... 4

Duty Role Components: Explained ............................................................................................................................ 4

Aggregate Privileges: Explained ................................................................................................................................ 5

Security Configuration in Oracle Applications Cloud: Points to Consider ................................................................... 6

2 Using the Security Console 7Security Console: Overview ...................................................................................................................................... 7

Administering the Security Console: Explained .......................................................................................................... 8

Running Retrieve Latest LDAP Changes: Procedure ................................................................................................. 9

Security Visualizations: Explained ............................................................................................................................ 10

Working with a Visualization Graph: Explained ........................................................................................................ 10

Working with a Visualization Table: Explained ......................................................................................................... 12

Generating a Visualization: Procedure ..................................................................................................................... 13

Simulating Navigator Menus in the Security Console: Procedure ............................................................................. 13

Security Console Analytics for Roles: Explained ...................................................................................................... 14

Security Console Analytics for Database Resources: Explained ............................................................................... 15

FAQs for Using the Security Console ...................................................................................................................... 16

3 Working with the Bridge for Microsoft Active Directory 17Bridge for Microsoft Active Directory: Explained ...................................................................................................... 17

Synchronizing Information Between Source and Target Applications: Explained ...................................................... 17

Mapping Information Between Source and Target Applications for Synchronization: Explained ................................ 18

Using the Bridge for Microsoft Active Directory ....................................................................................................... 20

FAQs on Working with the Bridge for Microsoft Active Directory ............................................................................. 25

Oracle ERP CloudSecuring ERP

4 Managing Implementation Users 27Implementation Users: Explained ............................................................................................................................ 27

Creating ERP Implementation Users: Overview ....................................................................................................... 27

Managing User Accounts: Explained ....................................................................................................................... 29

Reviewing and Editing User Accounts: Explained .................................................................................................... 29

Adding User Accounts: Procedure .......................................................................................................................... 30

Resetting Passwords: Procedure ............................................................................................................................ 31

Locking and Unlocking User Accounts: Procedure ................................................................................................. 31

Deleting User Accounts: Procedure ........................................................................................................................ 32

Defining Notification Templates: Explained .............................................................................................................. 32

Synchronizing User and Role Information: Procedure .............................................................................................. 33

Resetting the Cloud Service Administrator Sign-In Details: Procedure ..................................................................... 34

Managing User Categories ...................................................................................................................................... 34

5 Preparing for Application Users 39Overview ........................................................................................

Recommended

View more >