security in cloud applications
DESCRIPTION
Oracle Cloud Application SecurityTRANSCRIPT
-
The 10 principles of Security in Modern Cloud Applications (Pt 1 of 3)
Nigel KingFusion Functional Architecture
May 22 2014
-
Copyright 2013, Oracle and/or its affiliates. All rights reserved.2
Safe Harbor Statement
The following is intended to outline our general product direction. It is
intended for information purposes only, and may not be incorporated into
any contract. It is not a commitment to deliver any material, code, or
functionality, and should not be relied upon in making purchasing decisions.
The development, release, and timing of any features or functionality
described for Oracles products remains at the sole discretion of Oracle.
-
Copyright 2013, Oracle and/or its affiliates. All rights reserved.3
Program Agenda
Security in Fusion Applications
The 10 Principles
Demonstration: Hire an Employee
Q&A
-
Copyright 2013, Oracle and/or its affiliates. All rights reserved.4
HR Generalist
Procurement Manager
CFOPayables Supervisor
Applications Admin
VP of SalesMarketing Manager
Engineer
The Enterprise
-
Copyright 2013, Oracle and/or its affiliates. All rights reserved.5
Fusion Financials
Fusion Human Capital Management
Fusion Procurement
Fusion Sales & Marketing
Fusion Project Portfolio Management
Fusion Supply Chain Management
Fusion Governance, Risk & Compliance
Functional Footprint Role Based Access Control
-
Copyright 2013, Oracle and/or its affiliates. All rights reserved.6
Fusion Procurement Buyer Category Manager Procurement Manager
Procurement Contracts Administrator Procurement Catalog Administrator Procurement Applications
Administrator Supplier Administrator
Sourcing Project Collaborator
Supplier Bidder Supplier Accounts Receivable Specialist Supplier Customer Service
Representative Supplier Demand Planner Supplier Sales Representative Supplier Self Service Administrator Supplier Self Service Clerk
190 Seeded Job Roles across over 83 Applications
Functional Footprint Role Based Access Control
-
Copyright 2013, Oracle and/or its affiliates. All rights reserved.7
The Foundation Fusion Middleware
-
Copyright 2013, Oracle and/or its affiliates. All rights reserved.8
Transaction DB
Application UI (ADF) BI Dashboards Other UIs
Authentication AuthorizationCredentials Store
FrameworkUser & Role
Common Security Services
Access/SSO
Functional Permissions
Data Permissions
Webservices UCM BPEL/BPM ADFdi
WEB
SERVICE Desktop IntegrationADFdi
Common Security Services
-
Copyright 2013, Oracle and/or its affiliates. All rights reserved.9
Secure Out of The Box Across Tools Across the Info Lifecycle SOD
Role ProvisioningTransparent PoliciesStandards Based
Clean Access ModelSeamless Transition to IDM
Faster On boarding SSOManagement Approval WorkflowsEasier Regulatory Compliance