Category 141
Discussion List
-
We would like to customize all role and eliminate config capabilities/privileges from themSummary: We would like to customize all role and eliminate config capabilities/privileges from them Content (required): We would like to customize all role and eliminate… -
Role needed for access to "User and Role Access Audit Report"Hi, We're trying to get access to the "User and Role Access Audit Report" for a high level analyst/troubleshooter here without granting full access to the IT Security Ma… -
Setup and Maintenance to be made read onlySummary: protect all configurations from being edited because of the seeded roles assigned to users. We are looking for options to make the configurations (available und… -
Custom Recruiter role based on gradesHello , We have requirement to create a recruiter role which will have restrictions to view Requisitions which are created for some specific grades. Suppose as REQ is cr… -
Best Practice for Creating IT Support RolesSummary: Looking for feedback on the best way to create IT support roles in a production environment that is subject to SOX audit. Content (required): Our team continues… -
Error PER-1531817 on Updating a Data RoleSummary: Receiving error "Since delegation is allowed for this role, the person security profile that's used with it must be uniquely defined across all roles. (PER-1531… -
Queries regarding User security in EPM OCI gen 2Hi, I have the following queries regarding User security in EPM OCI Gen 2: How to add SSO to the 'My Services' page? Currently I added the SSO to applications in IDP pol… -
How to identify a user has capability to local log in or log in via SSO ?Summary: Hi Team, customer currently has enabled in PROD the SSO feature, and in security console the Chooser login feature is disabled. Is it possible to identify by ea… -
Checklist Template Security does not work to custom rolesSummary: Checklist Template Security does not work to custom roles Content (required): Why it is impossible to restrict/limit custom roles to access to view/assign check… -
Granting View-Only Access to Chart of Accounts for End UsersGranting View-Only Access to Chart of Accounts for End Users Content (required): We have a scenario where our customer needs to provide certain end users with view-only … -
Does Oracle support multiple authentication policies?Summary: Multiple authentication policies for employee versus contingent worker? Content (required): Hello, We are using Financials and Projects. Our current log in scre…James O'Brien 24 views 3 comments 0 points Most recent by Kishore Padala-Support-Oracle Applications Security -
What is the recommended approach to SSO - at Domain/IDCS level, or in ERP Instance directlySummary: What are the Pros and Cons of using IAMS Domain level SSO vs Environment (Security Console/Single Sign-on), and whicih is recommended? Content (required): Our E… -
License ConsumptionSummary: We are seeking clarity on the methodology for counting user licenses within Oracle Cloud HCM. While we are aware of the availability of SaaS usage reports and M…Suresh Subramaniyam 90 views 4 comments 1 point Most recent by Suresh Subramaniyam Applications Security -
How to stop e-mails being sent from a Dev/Test instanceSummary: We have a requirement to stop all e-mails being sent from our non Prod instances Content (required): As above, we need a method to stop all e-mails from being … -
Candidate Search option to search only candidate applied to RequisitionsHello , We are using Custom Hiring manager role, and in that we are adding "Search for Candidate" role which gives access to Candidate search under Hiring. As per our us… -
Security role autoprovisioning standard MSS roles when no position incumnentsWe are using the standard delivered HCM role autoprovisioning for our Managers to assign an MSS (Manager Self Service) role. The issue we have is that the role doesn't g… -
Can we Consolidate Fusion Domains into one single IAM domain?Summary: We have multiple delivered domains attached to our HCM/ERP fusion applications. These domains are DEV1, DEV2, TEST, and PROD. There is a separate new domain cal… -
Bulk Assignment of Data Access Assignment to UsersSummary: Bulk Assignment of Data Access Assignment to Users Content (required): Looking for ways to handle the Data Access Set assignments to the Users in Oracle Fusion …Venkat Racharla-179659 322 views 2 comments 0 points Most recent by Alex D-Oracle Applications Security -
Multifactor Authentication with Accops HyID App for SAASSummary: Multifactor Authentication with Accops HyID App for SAAS Application Content (required): Business uses Accops HyID App for log into all Company applications. We… -
O365 and Excel export filesSummary: Recently our company had an update for O365. After this update, we are not able to update Excel export file from Oracle system anymore. Have any of you experien…Solveig Annette Andersen 53 views 1 comment 0 points Most recent by erpexpert03 Applications Security -
MFA for Pending WorkersSummary: We are looking for a solution to introduce MFA for pending workers, while we maintain existing SSO for our employees. Content (required): We use SSO with O365 f… -
User Account - Remove Privilege to deleteSummary: I know it is bad practice to delete a user account, and that it should be locked/deactivated with all roles removed. I'd like to be able to copy the IT Security… -
For Oracle Fusion can I set an Access Control List (ACL) to only allow certain IP address ranges?Summary: For Oracle Fusion (in the cloud) can I set an Access Control List (ACL) to only allow certain IP address ranges to login? This will add more security to our ins… -
User ReportSummary: User Report Content (required): Is there an activity report that reflects user login and activities that were done by them. Whether they are active or inactive … -
Question on using PER_USER_ROLES tableHi Friends I'm quering the PER_USER_ROLES table to identify the list of users with their roles, and who/when it was updated. Until now, only the security team has been a… -
Audit table for fast formulasSummary: Team - We have a requirement from our auditors where they want a system generated report of ALL changes made in the system with history. Our internal IT team bu… -
Identify data role to enable person search in Work Schedule AssignmentSummary: Identify data role to enable person search in Work Schedule Assignment Content (required): Hello! I am working on a custom role which enables the users to manag… -
What are all the roles that provide access to admins so that they can provision new roles to userSummary: We have a Audit question from our Internal Audit Team: What are all the roles that provide access to admins so that they can provision new roles or modify roles…Sabarish Reddy Ganda 63 views 7 comments 0 points Most recent by Anil Rout-Oracle Applications Security -
External Agents access to fusionHello, We are adding External agents via ORC and they will role and particular User_Category assigned automatically. We have single sign on enabled ,so Agents are not ab… -
What is purpose of privilege BI Publisher Administrator > bip.administratorSummary: What is purpose of privilege BI Publisher Administrator > bip.administrator Content (required): What is purpose of privilege BI Publisher Administrator > bip.ad…