Top Banner
#C15LV REMINDER Check in on the COLLABORATE mobile app Transformation of E-Business Suite R12 security to Fusion Role Based Security Prepared by: Rajasekhar Ravichandran Vice President Chain-Sys India Pvt. Ltd Session ID#: 10451 Skype – rajasekhar_csi
18

Transformation of E-Business Suite R12 security to Fusion Role Based Security

Apr 14, 2017

Download

Documents

Rajasekhar R
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

REMINDERCheck in on the

COLLABORATE mobile app

Transformation of E-Business Suite R12 security to Fusion Role Based Security

Prepared by:Rajasekhar RavichandranVice PresidentChain-Sys India Pvt. Ltd

Session ID#: 10451

Skype – rajasekhar_csi

Page 2: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

2

Agenda

Page 3: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

3

Agenda

■ Introduction

■ Function Security

■ Role Based Security

■ Transforming to RBAC

■ Conclusion

■ Q&A

Page 4: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

4

Introduction

Page 5: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

5

EBS Function Security

Page 6: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

6

EBS Function Security

■ Forms

■ Form Functions▪ Sub functions

■ Menu▪ Sub Menu

■ Responsibility

Page 7: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

7

EBS Function Security

Page 8: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

8

Fusion Role Based Security

Page 9: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

9

Fusion Role Based Security

■ Job Roles

■ Data Roles

■ Duty Roles

■ Implementation RBAC▪ Oracle Identity Manager (OIM)▪ Authorization Policy Manager (APM)▪ Application Access Controls Governor (AACG)

Page 10: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

10

Fusion Role Based Security

Page 11: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

11

Transforming to RBAC

Page 12: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

12

Reasons to Transform to RBAC

■ Improve Security of Systems and Applications

■ Easily Make Security Changes

■ Easily Meet Audit Requirements

■ Increase Productivity of Employees 

■ Reduce costs 

Page 13: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

13

Function Security Vs RBAC

Page 14: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

14

Conclusion

Page 15: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

15

Conclusion

■ RBAC involves more objects than responsibility-based security

■ RBAC is slightly more complex to set up initially.

■ However, RBAC is also more powerful and flexible than using only function security.

■ Transforming to RBAC can save a lot of time and effort in the long term by making administration of individual users and groups of users easier.

Page 16: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

16

Q&A

Page 17: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

17

Page 18: Transformation of E-Business Suite R12 security to Fusion Role Based Security

#C1

5LV

Please complete the session evaluationWe appreciate your feedback and insight

You may complete the session evaluation either on paper or online via the mobile app