To ensure that questions get required attention from community members and are NOT left unanswered, it’s important for the author to indicate (by selecting “Yes” or “No” when prompted) whether the question was answered. (newly added) Please note that it is also important to respond to EACH comment your question receives. Your Yes or No response ensures an accurate status for your question.
For more information, please refer to this announcement explaining best practices for getting answers to questions.
For more information, please refer to this announcement explaining best practices for getting answers to questions.
Applications Security
Discussion List
-
Can we track change to Enable Chooser Login PageSummary: In PRD environment everybody needs to login via SSO. So the SSO setup for Enable Chooser Login Page is disabled. Sometimes we need to enable this. Is there a wa…
-
Table name for Functional and Data Security policiesSummary: Table name for Functional and Data Security policies Content (required): Hi, Please advise table name for Functional and Data Security policies? Regards, Bhavna…
-
we need to create custom role to only allow the user to add values to specific segment in the COA.Summary: we are looking to establish a custom role that will grant users the specific permission to input values into specific segments within the Chart of Accounts (COA…
-
Suppress logout confirmationSummary: Hi, We have enabled SSO b/w Fusion Cloud Application and IDCS with IDCS as IdP.When logout is initiated from the application it presents a button for the user t…
-
Report on approval flows areas of responsibilitySummary Is there an option to report on the approval flows?Content Hi, We are implementing the areas of responsibilities way of security in the system. Our Approval Flow…
-
Need to understand a common lookup deleteSummary: Security team - We had an incident where a particular lookup type was deleted from common lookups. This lookup happens to be the reference for a lot of our crit…
-
EPM OCI Gen 2: Can we create a user without Identity Domain CredentialsHi, In EPM Classic environments, when creating a new user there is a checkbox for Identity Domain Credentials. If it is unchecked then the user does not get credentials …
-
Role required for Administering Oracle WebCenter ContentHi, What is the role required for Administering Oracle WebCenter Content? We need to perform the below action but the admin tab is missing Administrator 1. Log into WCC …
-
Privileges for Licensing Calculation- MOS LinkSummary: MOS document (Doc 2512712.1) that lists privileges that drive licenses is no longer accessible. Content (required): The document that listed which privileges th…
-
How tunnuling works in LBAC if we have 2 tunnels and user is using public networkWe are enabling LBAC for client, we have shared all info related to IP and other stuff, but Client wants to know how exactly Oracle login is getting the IP address & tak…
-
What Privileges Give Access to "Manage Setup Content"Summary: What privilege is tied to the "Manage Setup Content" item in FSM? I can't seem to find any definitive hit when looking at privileges in the Security Console. Th…
-
PGP keys in Oracle Cloud ApplicationsSummary PGPContent Hello, To generate PGP keys and use the same keys to encrypt/decrypt files in Oracle Cloud Applications. Is the tool available from "https://www.gpg4u…
-
OCI Migration ClarificationsHi, We have a couple of questions regarding OCI Migration: 1. As per Oracle migration doc, the environments given for testing will be refreshed and be used as the new OC…
-
You do not have permission to access this information. Contact your help desk. (FND-13)Summary: Getting below error "You do not have permission to access this information. Contact your help desk. (FND-13)" while performing Change assignment via "Temporary …
-
Error: Failed to retrieve data from Presentation ServerCould not connect to OBI Presentation ServiceSummary: We have a user account meant only for reporting access so it was created directly from Security Console without an employee relationship. When trying to run the…
-
Enterprise Contract AdministratorHi everyone, We have noticed that in our company, when granted the seeded role Enterprise Contract Administrator, a user can search, consult and edit ANY contracts, and …
-
Data mask Candidates(Internal/External) and Person ContactHi, When we request for data masking through Oracle SR, does it mask the Person Contact details- Contact name, email ,address etc and the Candidate details ? Thanks in a…
-
Multi Factor Authentication (MFA) in Oracle Fusion HCMSummary: Hi Experts, Can we have Multi Factor Authentication (MFA) in Oracle Fusion HCM for all login into oracle hcm ? The intent is to ensure all Local Logins are conf…
-
Role to give access to reports and analytics and run the report to get access to all dataSummary Role to give access to reports and analytics and run the report to get access to all data, view all access for the reportsContent Dear All: We have this requirem…
-
How do I sync PROD user security & data access to TESTSummary: Sync PROD user security & data access to TEST Content (required): I am looking for a way to sync the users, assigned roles and data access in PROD over to TEST.…
-
How to get user deactivation date details in fusionSummary: Our customers audit requirement is to get the deactivated user details when the particular user got deactivated and by whom. But from Fusion we are not able to …
-
Multiple inactive user accounts, previously used by a resigned employees are now active again.Hi All, Our client has reported that multiple inactive user accounts, which are previously used by a resigned employees is now active again when they check after few mon…
-
Assigning person number on worker recordSummary: Assigning person number on worker record while creating users Content (required): We are in the process of implementing Oracle Cloud GL and most of the EPM modu…
-
Access Groups EnablementWe are trying to create a Custom Role, which should be accessible from My Groups section of Vacation Period in BPM Worklist. Even after assigning Access Groups Enablemen…
-
Its posible inactivate users based in Days Since Last Activity automaticallySummary: Feature to inactivate users that has more 30 days without login Content (required): Customer need a process or feature to inactivate users that has more 30 days…
-
Risk dashboard icon not showing under risk management moduleRisk dashboard icon not showing under risk management module please suggest me ? is there any role is required?
-
Extract Activities Event Logs for roles assigned against multiple usersPlease share procedure so that we can get Activities Event Logs against assigned roles of active or inactive employees
-
Is it possible to see which roles are changed through the audit report on OPSS?Summary: Is it possible to see which roles are changed through the audit report on OPSS? Through the seeded audit report, I can only see the privileges being added or re…
-
We would like to customize all role and eliminate config capabilities/privileges from themSummary: We would like to customize all role and eliminate config capabilities/privileges from them Content (required): We would like to customize all role and eliminate…
-
Role needed for access to "User and Role Access Audit Report"Hi, We're trying to get access to the "User and Role Access Audit Report" for a high level analyst/troubleshooter here without granting full access to the IT Security Ma…