67

Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Embed Size (px)

Citation preview

Page 1: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:
Page 2: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domains, VPDs and Vendor Access Solution

OTM Domain and VPD Design

Page 3: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Program Agenda

Objective

OTM Domains

OTM VPDs

Vendor Based Security Scenario

Q&A

1

2

3

4

5

Oracle Confidential – Internal/Restricted/Highly Restricted 3

Page 4: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domains and VPDs Objective

Oracle Confidential – Internal/Restricted/Highly Restricted

4

Page 5: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Objective

• Review OTM Domain and VPD concepts

• Provide Domain and VPD Design Tips

• Review a Sample Vendor Based Security Scenario

Oracle Confidential – Internal/Restricted/Highly Restricted 5

Page 6: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Data Security vs. Data Filtering Definition

Oracle Confidential – Internal/Restricted/Highly Restricted

6

Page 7: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Data Security:

• Protecting Data from destructive forces and the unwanted actions of unauthorized users

Data Filtering:

• A wide range of strategies or solutions for refining data sets. Data sets are refined into what a user (or a set of users) needs, without including other data that can be repetitive or irrelevant

Oracle Confidential – Internal/Restricted/Highly Restricted 7

Data Security vs. Data Filtering

Page 8: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

OTM Data Security Tools:

• Domains

• VPD Profiles

• Access Control Lists

• User Roles

• User Configuration

OTM Data Filtering Tools:

• UI Screen Set Filters

• Manager Layouts

• Saved Queries

• Business Monitors

• Reports

Oracle Confidential – Internal/Restricted/Highly Restricted 8

Data Security vs. Data Filtering

Page 9: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domains Purpose

Oracle Confidential – Internal/Restricted/Highly Restricted

9

Page 10: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Purpose of Domains and VPDs

• Definition of Data Segregation for Security Reasons

• Workflow / Process Segregation

• Can be used for Data Segregation for Filtering purposes*

*Recommend evaluating other options

Page 11: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domains Types

Oracle Confidential – Internal/Restricted/Highly Restricted

11

Page 12: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain Types

• Peer Domains

• Hierarchical Domains

• PUBLIC Domain

• SERVPROV Domain

• Module Domains

Page 13: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Peer Domains

• They are Self Contained when created

• No implicit relationships with other Domains

• Relationship with other Domains is defined manually

Page 14: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Hierarchical Domains

• Hierarchical structure defined when created

• Implicit Top-Down security enforced. Users in the Parent Domain have implied access to all the Sub-domains.

• Additional relationships can be defined with other Domains.

Page 15: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

PUBLIC Domain

• Contains the OTM System Parameters

• Contains configuration that is shared by all Domains

• Data in the PUBLIC Domain can only be updated by user DBA.ADMIN

• All Domains have implicit Read access to the PUBLIC Domain

Page 16: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

SERVPROV Domain

• Used to configure Service Provider users

• Created with the necessary Carrier security configuration

• Users in this Domain are created automatically when a Service Provider is created in OTM

• Additional Carrier users can be created and associated manually with Service Providers

Page 17: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Module Specific Domains

• New Domains created to support new OTM modules

• Usage depends on the Module that uses them

Page 18: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domains Design

Oracle Confidential – Internal/Restricted/Highly Restricted

18

Page 19: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain Design

Domain and VPD design should be done as part of the full OTM Data Security Design.

Oracle Confidential – Internal/Restricted/Highly Restricted 19

Page 20: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain Design • How is your Transportation data currently segregated in current systems?

What is your target segregation? Is Consolidation an Implementation Objective? – Segregation by Client – Geographical or Sales Region – Order Source System – Data Type

• Master Data • Transactional Data • Invoicing/Payment Data

• Users are configured by Domain. Consider what each configured user will have to see in OTM

Page 21: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain Design

How are your Transportation/Logistics and purchasing departments organized?

What objects (orders, shipments, invoices, etc.) is each department responsible for?

• Geographically: region? (APAC, NAM, EMEA), country?

• IT Group (using a specific Software instance)

• Previous company

• Product Line

• DC, Warehouse .

Oracle Confidential – Internal/Restricted/Highly Restricted 21

Page 22: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain Design

What are your Data Security Segregation Concerns/Requirements by object type

• Rates

• Orders

• Shipments

• Invoices

• Vouchers

• Locations*

Oracle Confidential – Internal/Restricted/Highly Restricted 22

Page 23: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain Design

• From all the information gathered and any other current or Target Data Segregation (or Consolidation) Requirements:

• Identify (and exclude) Data Filtering Requirements

• Identify Data Security Requirements

• Identify which OTM Data security tools will address each Data Security Requirement

• Create an OTM Domain Design Document to meet the Data Security Requirements addressed by Domain Configuration

Oracle Confidential – Internal/Restricted/Highly Restricted 23

Page 24: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Hierarchical vs. Peer Domains

Page 25: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 25

Hierarchical vs. Peer Domains

Page 26: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Peer Domains

Created as Stand-Alone Domains, the only Parent Domain is the PUBLIC Domain

Pros & Cons:

• Pros: More control, less potential complexity, more flexibility, easier debugging, easier maintenance

• Cons: Could cause some workflow duplication, less re-use, more maintenance

Page 27: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Peer Domains

Use when?

• Data is independent

• Data sharing needs to be more flexible

• Process flows in OTM are different

Page 28: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Hierarchical Domains

Implicit Top-Down security enforced. Users in Parent Domain have implied access to all the Sub-domains.

Pros & Cons

• Pros: automatic pre-established relationships, security and control. Less initial setup required

• Cons: less flexibility, exceptions harder to manage, difficult to override parent/domain implicit relationship for exceptions

Page 29: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Hierarchical Domains Use when?

• Data relationship between domains is mostly hierarchical (Top down)

• Objects exist where their process is the same across all Sub-Domains

• No need to control processes in Parent and Sub-Domain for the same object types

Page 30: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

PUBLIC Domain • Avoid doing any application configuration there

• Avoid using the workflows in this domain, if you need one, copy it to your domain

• Do not use it to for any kind of transactional processing

• Lock it down!

Page 31: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domains and Workflows

Where do I create my workflows? For Peer Domains? For Hierarchical Domains? In the Parent Domain? Sub-domains?

Page 32: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domains and Workflows • For Peer Domains, create Workflows in the Domains where their

object types are stored

• For Hierarchical Domains, create Workflows in the highest level that will be common for all Sub-Domains

Page 33: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain Design

• Define List of Domains to be created

• Define List of objects in each domain: – Try to keep all of each object type at the same level if using Hierarchical, in one Domain

if using Peer Domains with grants • Transactional data: Orders, shipments, invoices, vouchers, etc.

• Master data: Items, Locations, Service providers, Rate Information

• Define Domain Relationships/Grants: – Read

– Read/Write

– Include Grantor Sub-domains (option) *

– All Table Sets/Some Table Sets

Page 34: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Typical 3PL Scenario

LOCATIONS

ITEMS

ORDER TYPES

PAYMENT METHODS

WORKFLOWS

ORDER RELEASES

SELL SHIPMENTS

BILLS

QUALIFIERS

SERVICE PROVIDERS

RATE OFFERINGS

RATE RECORDS

SPECIAL SERVICES

ITINERARIES

PLANNING GROUPS

EQUIPMENT GROUPS

WORKFLOWS

BUY SHIPMENTS

INVOICES, VOUCHERS

QUALIFIERS

3PL

CLIENT A CLIENT B

TRANSPORT MODES

EVENT GROUPS

STATUS CODES

PUBLIC

CLIENT C

READ/WRITE

READ/WRITE

READ/WRITE

READ

READ

READ

Page 35: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Typical Corporate Scenario

READ

READ

PUBLIC1

OTM System

Configuration Data

Domain Design

MASTER

DATA

· Users

· Items

· Contacts

· General Ledger

Codes

· Locations

· Service

Providers

· RefNum

Qualifiers

· Involved Party

Qualifiers

· Remark

Qualifiers

· Statuses

· Rates

· Equipments

1 By Default all Domains have Read Access to the Public Domain

SERVPROV*

· (TLS) Shipment

Events

· (TLS)Tenders

*Read/Write only to

Service Provider’s

Shipments

TRANSACTIONAL

DATA

· Users

· Orders

· Buy Shipments

· Shipment

Events

· Invoices

· Vouchers

· Workflow

· Statuses

· Screen Sets

· Manager

Layouts

· RefNum

Qualifiers

READREAD/

WRITE

READ

READ

OTM Module

Domains

This will be determined as

needed for new TMS

Processes and/or future

services growth

Page 36: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domains Configuration

Oracle Confidential – Internal/Restricted/Highly Restricted

36

Page 37: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

OTM Domain Configuration

• A Domain defines the Data that a User and his processes have access to

• By Default, a User can only access data in his Domain + PUBLIC data + data in its Sub-domains

• Additional access can be provided using Grants

• Grants are given from one Domain to another:

Page 38: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain Grants • Tableset: List of tables created so that grants can be made in terms of

table sets rather than individual tables. The ALL_TS table set contains all the “normal” OTM tables.

• Domain Grant: A Domain Grant allows access from one domain to another to all the tables in the domain or to a subset of tables (table set). A user logged in one domain can see data in the other domain to which they have been granted access.

Page 39: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain grants

Recommendations:

• Use Grant access to ALL_TS if possible

• Limit use of Read/Write permissions

• Use Include Grantor Sub-Domains option with care if needed

• Use appropriate Domain Names (Search, Integration, Reporting Impact)

Page 40: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Domain Grants

• Note on “Include Grantor Subdomains” option:

– Be Careful if you are using Hierarchical Domains and granting read access to the parent domain

Oracle Confidential – Internal/Restricted/Highly Restricted 40

Page 41: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPDs (Virtual Private Databases)

Oracle Confidential – Internal/Restricted/Highly Restricted

41

Page 42: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Definition

• Virtual Private Databases provide fine-tuned Data Access Control to Users

• A Virtual Private Database (VPD) is an Oracle feature that provides Fine-Tuned Access Control, down to the level of Table Rows

• Similar to adding a SQL “Where” clause to every Query executed by the User

Oracle Confidential – Internal/Restricted/Highly Restricted 42

Page 43: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Benefits

• Maintenance: Applied at the Database Level once, no need to manage at the App Layer

• Flexibility. VPDs provide different Policies (Read, Insert, Update, etc), at the Table Row level

• Data is secure no matter how the user accesses the data (UI, Operational Reports*, etc)

Oracle Confidential – Internal/Restricted/Highly Restricted 43

Page 44: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Profile Cautions

• External Predicates need to be designed by someone with good DB and SQL knowledge

• An External Predicate with erroneous or inefficient SQL can bring down OTM

Oracle Confidential – Internal/Restricted/Highly Restricted 44

Page 45: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Profiles Design

Oracle Confidential – Internal/Restricted/Highly Restricted

45

Page 46: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Profile Design

• VPD Profiles should be used to address Data Security Requirements NOT Data Filtering Requirements

• A thorough OTM User Configuration review is needed to identify the Tables that require External Predicates (Menus, Screen Sets, etc)

• It may not always be possible to completely exclude Visibility to certain Table Rows

• VPD’s are not the only Data Security tool in OTM, ensure the requirement is met by the appropriate OTM Tool

• Review and test the Operations to the Objects a User will execute

Oracle Confidential – Internal/Restricted/Highly Restricted 46

Page 47: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Profile Design (Domain vs. VPD)

The Main objective of a VPD Profile is: To further section out access to Data at a more granular level

The Domain level should be fairly general, because creating a new domain impacts:

• Data Keys (Master Data: Items, Locations, Transactional Data: Orders, Shipments)

• Integration

• User Configuration

• Workflows

Oracle Confidential – Internal/Restricted/Highly Restricted 47

Page 48: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Design (Domain vs. VPD)

When to use VPDs?

When there is a need to segregate some of the data at a lower level for users that otherwise would be able to use almost the same OTM configuration, i.e. :

• - UI configuration (Menus, Screen Sets, etc)

• - Master Data

• - Integration

• - Workflows

• - Messages

Oracle Confidential – Internal/Restricted/Highly Restricted 48

Page 49: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Profiles Configuration

Oracle Confidential – Internal/Restricted/Highly Restricted

49

Page 50: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Profile Configuration

• A VPD Profile is a set of Virtual Private Database (VPD) Rules

• VPD Rules provides fine-grained Access Control to Users, across or within Domains

• VPD Profiles are assigned to User Roles

• User Roles are assigned to Users

Oracle Confidential – Internal/Restricted/Highly Restricted 50

Page 51: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Profile Configuration

Oracle Confidential – Internal/Restricted/Highly Restricted 51

Page 52: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Profile Configuration

VPD Profile General Information:

• Use Insert User Rule to limit access to data that the current user entered

• Select Use External Predicate Rule to limit user access to Database Tables and Rows specified by the statements in the External Predicates defined in the VPD Profile

• Clear the Use Domain Rule check box to disable Domain Level Security for a given VPD profile*

Oracle Confidential – Internal/Restricted/Highly Restricted 52

Page 53: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Profile Configuration

VPD Rules with External Predicates:

• Table Name: Table for which this rule will apply

• Predicate: SQL where clause that will be applied to the table. This will be an additional “data filter” applied any time the user queries this table

• External Predicate Access. Appropriate access rights that should apply to the table and predicate:

– ALL, Read, Insert, Update, Delete, Insert/Update/Delete

Oracle Confidential – Internal/Restricted/Highly Restricted 53

Page 54: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Context Variables

• Definition

Oracle Confidential – Internal/Restricted/Highly Restricted 54

Page 55: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Context Variables

Assigned to a Role

• Function sys_context(context, variable) available for use in VPD Rules

Oracle Confidential – Internal/Restricted/Highly Restricted 55

Page 56: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Context Variables

Standard Context Variables:

• sys_context('GL_USER_CTX','log_in_user_gid')

• sys_context('GL_USER_CTX',‘gl_user_gid')

Configured Context Variables:

• sys_context('GL_USER_CTX','LOCATION_GROUP'

Oracle Confidential – Internal/Restricted/Highly Restricted 56

Page 57: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Vendor VPD Example

Oracle Confidential – Internal/Restricted/Highly Restricted

57

Page 58: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Vendor VPD Example

VPD Scenario: Vendors

Assumption is that all Vendors can use:

• Same UI configuration

• Master Data

• Interfaces

• Workflows

• Message notifications

Oracle Confidential – Internal/Restricted/Highly Restricted 58

Page 59: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

VPD Vendor Example

• Objective: Vendors must not see other Vendors Orders or Shipments

Oracle Confidential – Internal/Restricted/Highly Restricted 59

Page 60: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Vendor VPD Example Step 1. Identify the Tables involved

Considerations:

• Be careful to not miss related tables

• Be careful to consider all the UI menu options that users have access to

• -Shipment

• - Shipment Stop

• - Ship Units

• - Order Bases

• - Order Base Lines

• - Order Releases

Oracle Confidential – Internal/Restricted/Highly Restricted 60

Page 61: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Vendor VPD Example

• Step 2. Identify the Criteria used to segregate the Orders and shipments

• Source Location? *

• Destination Location?

• Involved Party?

Oracle Confidential – Internal/Restricted/Highly Restricted 61

Page 62: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Vendor VPD Example

• Step 3. Design the Structure to link the Criteria to the User or User Role

• Step 4. Write External predicates

• Step 5. Test Predicates

• Step 6. Create VPD Profile

• Step 7. Test VPD Profile

Oracle Confidential – Internal/Restricted/Highly Restricted 62

Page 63: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Vendor VPD Example

• Sample Docs

Oracle Confidential – Internal/Restricted/Highly Restricted 63

Page 64: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Q & A

Page 65: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Page 66: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools:

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 66

Page 67: Domains, VPDs and Vendor Access · PDF fileOTM Data Security Tools: •Domains •VPD Profiles •Access Control Lists •User Roles •User Configuration OTM Data Filtering Tools: