To ensure that questions get required attention from community members and are NOT left unanswered, it’s important for the author to indicate (by selecting “Yes” or “No” when prompted) whether the question was answered. (newly added) Please note that it is also important to respond to EACH comment your question receives. Your Yes or No response ensures an accurate status for your question.
For more information, please refer to this announcement explaining best practices for getting answers to questions.
For more information, please refer to this announcement explaining best practices for getting answers to questions.
Applications Security
Discussion List
-
PGP keys in Oracle Cloud ApplicationsSummary PGPContent Hello, To generate PGP keys and use the same keys to encrypt/decrypt files in Oracle Cloud Applications. Is the tool available from "https://www.gpg4u…
-
OCI Migration ClarificationsHi, We have a couple of questions regarding OCI Migration: 1. As per Oracle migration doc, the environments given for testing will be refreshed and be used as the new OC…
-
You do not have permission to access this information. Contact your help desk. (FND-13)Summary: Getting below error "You do not have permission to access this information. Contact your help desk. (FND-13)" while performing Change assignment via "Temporary …
-
Error: Failed to retrieve data from Presentation ServerCould not connect to OBI Presentation ServiceSummary: We have a user account meant only for reporting access so it was created directly from Security Console without an employee relationship. When trying to run the…
-
Enterprise Contract AdministratorHi everyone, We have noticed that in our company, when granted the seeded role Enterprise Contract Administrator, a user can search, consult and edit ANY contracts, and …
-
Data mask Candidates(Internal/External) and Person ContactHi, When we request for data masking through Oracle SR, does it mask the Person Contact details- Contact name, email ,address etc and the Candidate details ? Thanks in a…
-
Multi Factor Authentication (MFA) in Oracle Fusion HCMSummary: Hi Experts, Can we have Multi Factor Authentication (MFA) in Oracle Fusion HCM for all login into oracle hcm ? The intent is to ensure all Local Logins are conf…
-
Role to give access to reports and analytics and run the report to get access to all dataSummary Role to give access to reports and analytics and run the report to get access to all data, view all access for the reportsContent Dear All: We have this requirem…
-
How do I sync PROD user security & data access to TESTSummary: Sync PROD user security & data access to TEST Content (required): I am looking for a way to sync the users, assigned roles and data access in PROD over to TEST.…
-
How to get user deactivation date details in fusionSummary: Our customers audit requirement is to get the deactivated user details when the particular user got deactivated and by whom. But from Fusion we are not able to …
-
Multiple inactive user accounts, previously used by a resigned employees are now active again.Hi All, Our client has reported that multiple inactive user accounts, which are previously used by a resigned employees is now active again when they check after few mon…
-
Assigning person number on worker recordSummary: Assigning person number on worker record while creating users Content (required): We are in the process of implementing Oracle Cloud GL and most of the EPM modu…
-
Access Groups EnablementWe are trying to create a Custom Role, which should be accessible from My Groups section of Vacation Period in BPM Worklist. Even after assigning Access Groups Enablemen…
-
Its posible inactivate users based in Days Since Last Activity automaticallySummary: Feature to inactivate users that has more 30 days without login Content (required): Customer need a process or feature to inactivate users that has more 30 days…
-
Risk dashboard icon not showing under risk management moduleRisk dashboard icon not showing under risk management module please suggest me ? is there any role is required?
-
Extract Activities Event Logs for roles assigned against multiple usersPlease share procedure so that we can get Activities Event Logs against assigned roles of active or inactive employees
-
Is it possible to see which roles are changed through the audit report on OPSS?Summary: Is it possible to see which roles are changed through the audit report on OPSS? Through the seeded audit report, I can only see the privileges being added or re…
-
We would like to customize all role and eliminate config capabilities/privileges from themSummary: We would like to customize all role and eliminate config capabilities/privileges from them Content (required): We would like to customize all role and eliminate…
-
Role needed for access to "User and Role Access Audit Report"Hi, We're trying to get access to the "User and Role Access Audit Report" for a high level analyst/troubleshooter here without granting full access to the IT Security Ma…
-
Setup and Maintenance to be made read onlySummary: protect all configurations from being edited because of the seeded roles assigned to users. We are looking for options to make the configurations (available und…
-
Custom Recruiter role based on gradesHello , We have requirement to create a recruiter role which will have restrictions to view Requisitions which are created for some specific grades. Suppose as REQ is cr…
-
Best Practice for Creating IT Support RolesSummary: Looking for feedback on the best way to create IT support roles in a production environment that is subject to SOX audit. Content (required): Our team continues…
-
Error PER-1531817 on Updating a Data RoleSummary: Receiving error "Since delegation is allowed for this role, the person security profile that's used with it must be uniquely defined across all roles. (PER-1531…
-
Queries regarding User security in EPM OCI gen 2Hi, I have the following queries regarding User security in EPM OCI Gen 2: How to add SSO to the 'My Services' page? Currently I added the SSO to applications in IDP pol…
-
How to identify a user has capability to local log in or log in via SSO ?Summary: Hi Team, customer currently has enabled in PROD the SSO feature, and in security console the Chooser login feature is disabled. Is it possible to identify by ea…
-
Checklist Template Security does not work to custom rolesSummary: Checklist Template Security does not work to custom roles Content (required): Why it is impossible to restrict/limit custom roles to access to view/assign check…
-
Granting View-Only Access to Chart of Accounts for End UsersGranting View-Only Access to Chart of Accounts for End Users Content (required): We have a scenario where our customer needs to provide certain end users with view-only …
-
adfdiSummary: What is the :/ for installing ADFDI Content (required): As per Oracle note "How to install the ADF Desktop Integration Add-in for Excel (Doc ID 2681794.1)", the…
-
Does Oracle support multiple authentication policies?Summary: Multiple authentication policies for employee versus contingent worker? Content (required): Hello, We are using Financials and Projects. Our current log in scre…
-
What is the recommended approach to SSO - at Domain/IDCS level, or in ERP Instance directlySummary: What are the Pros and Cons of using IAMS Domain level SSO vs Environment (Security Console/Single Sign-on), and whicih is recommended? Content (required): Our E…