Ø There
is no specific person acting as an System Administrator In Oracle Application
Product. This Module is highly used by the Apps DBA consultants to manage the
User Logins and to Control the Concurrent Program Managers. Apart from this the
Higher Senior Level Managers use this Module to provide rights to update the
Profile Options, Creation of Custom Responsibilities, Monitor Audit Controls,
Configuration of Printer Program, Registration of the Custom Programs, Forms
and Reports
Define
New Users
Ø The
Login ID or User Name is must for the people accessing into Oracle Application
either a Business Team or Consultants. The Login User Name is not suppose to be
Shared
Ø The
Login Name can be provided to the organization customers / Suppliers to access
the Self Service Application like i-Receivables, i-Procurements, i-Supplier
Portal
Ø Mostly
all the Employees will be provided a separate login Name to access the
i-Expense Module
Ø Each
Login User Name will be assigned the respective Responsibility based on their
nature of the designation and Roles.
Ø For
ex., Finance Team will be accessing all the Financials Modules and SCM Team
will be accessing all the SCM Modules, CFO can have responsibility related to
General Ledger Module
Ø Once
a User Name is created, we can’t able delete those Login ID, we can Inactive
those ID if not in Use.
Ø The
Login Name or User Name should be always associated with an Employee or
Supplier or Customer Contact Person.
Ø Navigation:
Security > User > Define
Ø User
Name, Password, Description, Password Expiry, Employee Name is required at the
Header Level
Ø Line
Level we can assign the List of Responsibilities to be accessed by those Users
Ø A
Responsibility is the Physical look and Feel of the Oracle Application Modules
Ø A
Particular Module like Oracle Payables is separated by Responsibilities like
Payables Manager, Payables Controller, Payables End Users based on the Business
Team Activity
Ø There
are so many predefined Responsibilities provided by default we can make use of
those responsibilities if it’s satisfy our requirement
Ø We
can also create a Custom Responsibility like ABC India Payables Manager, ABC
India Payables Controller etc.,
Ø To
Create a New Responsibility there components are required
Data Group – used to Connect to your
Data Base (Mostly Standard)
Menu Group – The Menu or Function
(Forms)
Request Group – The Concurrent
Programs or Reports
Ø The
Physical Feel of the 3-Tier Architecture can be highly visible through
accessing the Responsibility
Ø Once
the User Login into the System, the Personal Home Page (PHP) Screen list all
the applicable Responsibility assigned to those users. So that Users Click on a
Particular Responsibility, then system connects to the Application Tier and
Data Base Tier by default.
Ø Exclusion
Criteria – To Restrict a Particular Form or Menu or Sub Menu we can make use of
the Exclusion Criteria. To Hide certain functionalities to the Users this
option is highly used rather than customize a New Menu Group
Ø Exclude
a Form (Functions)
Ø Exclude
a Form Components (Like Posting Button)
Ø Exclude
a Menu (Menu Name – Like Setup Menu)
Ø Exclude
a Sub Menu (A Particular Sub Menu Functions)
Profile
Options
Profile Option is one of the Important concepts in the
entire Oracle Application to Control certain Objects.
Ø Profile
Options set the Behavior of the Application or Module or Responsibilities.
Ø All
the Profiles are grouped based on Modules and it is predefined by Default
Ø Each
Profile Name is used for a certain activity
Ø You
can Set the Profile Options in the following Manner
1.
Site Level – Lowest Level
2.
Application Level – For a Specific Module
3.
Responsibility Level – For a Specific
Responsibility
4.
User level – For a Specific User Name
Ø The
User Level is the Highest Priority which overrides the other 3 Levels.
Ø Mostly
the Profile are configured at Site Level or Responsibility Level
Ex., GL: Ledger Name, MO:
Operating Unit, HR: Business Group
Security
Levels
1.
Functional Security – Restriction of
Certain Functions / Menu / Sub Menu. This is done through the Exclusion
Criteria concepts in the Responsibility Screen
2.
Data Security – The Data Security is at
Table Level. This is highly used in the Self Service Application Module. For
Ex.,
Ø A
Responsibility like i-Supplier Portal is assigned to multiple Vendors through a
separate login Name
Ø While
a Vendor is accessing these Responsibility, only Data related to his
transactions should be accessed by these Vendor. Overall all the Data of the
vendor transactions is available in a Single Table. While accessing through a
Login Name the data automatically gets filtered and display those transactions
which is applicable for those Login Name.
Ø This
can be configured through Security Attributes for Rows and Exclusive Attributes
for Columns
3.
Role Based Security – The Role Based Access
Control (RBAC) is used to provide certain functionalities based on the Roles of
the business. For Ex., Buyer is a Role in Purchasing Module, where as a certain
Employees can be assigned as a Buyer to Create the Purchase Order. Not anyone
can create a Purchase Order, only those who assigned as a Buyer can only able
to create the PO’s even though other have access to those Modules
Ex., In Project Accounting
Module, One Employee can be assigned as Project Manager in One Projects, so
that he has all the rights to update the resource list, budgets and the same
employee can be assigned as Project Administrator in another Project with some
limited controls.
No comments:
Post a Comment