Upload
rajasekhar-r
View
211
Download
0
Embed Size (px)
Citation preview
#C1
5LV
REMINDERCheck in on the
COLLABORATE mobile app
Transformation of E-Business Suite R12 security to Fusion Role Based Security
Prepared by:Rajasekhar RavichandranVice PresidentChain-Sys India Pvt. Ltd
Session ID#: 10451
Skype – rajasekhar_csi
#C1
5LV
2
Agenda
#C1
5LV
3
Agenda
■ Introduction
■ Function Security
■ Role Based Security
■ Transforming to RBAC
■ Conclusion
■ Q&A
#C1
5LV
4
Introduction
#C1
5LV
5
EBS Function Security
#C1
5LV
6
EBS Function Security
■ Forms
■ Form Functions▪ Sub functions
■ Menu▪ Sub Menu
■ Responsibility
#C1
5LV
7
EBS Function Security
#C1
5LV
8
Fusion Role Based Security
#C1
5LV
9
Fusion Role Based Security
■ Job Roles
■ Data Roles
■ Duty Roles
■ Implementation RBAC▪ Oracle Identity Manager (OIM)▪ Authorization Policy Manager (APM)▪ Application Access Controls Governor (AACG)
#C1
5LV
10
Fusion Role Based Security
#C1
5LV
11
Transforming to RBAC
#C1
5LV
12
Reasons to Transform to RBAC
■ Improve Security of Systems and Applications
■ Easily Make Security Changes
■ Easily Meet Audit Requirements
■ Increase Productivity of Employees
■ Reduce costs
#C1
5LV
13
Function Security Vs RBAC
#C1
5LV
14
Conclusion
#C1
5LV
15
Conclusion
■ RBAC involves more objects than responsibility-based security
■ RBAC is slightly more complex to set up initially.
■ However, RBAC is also more powerful and flexible than using only function security.
■ Transforming to RBAC can save a lot of time and effort in the long term by making administration of individual users and groups of users easier.
#C1
5LV
16
Q&A
#C1
5LV
17
#C1
5LV
Please complete the session evaluationWe appreciate your feedback and insight
You may complete the session evaluation either on paper or online via the mobile app