transformation of e-business suite r12 security to fusion role based security
TRANSCRIPT
![Page 1: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/1.jpg)
#C1
5LV
REMINDERCheck in on the
COLLABORATE mobile app
Transformation of E-Business Suite R12 security to Fusion Role Based Security
Prepared by:Rajasekhar RavichandranVice PresidentChain-Sys India Pvt. Ltd
Session ID#: 10451
Skype – rajasekhar_csi
![Page 2: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/2.jpg)
#C1
5LV
2
Agenda
![Page 3: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/3.jpg)
#C1
5LV
3
Agenda
■ Introduction
■ Function Security
■ Role Based Security
■ Transforming to RBAC
■ Conclusion
■ Q&A
![Page 4: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/4.jpg)
#C1
5LV
4
Introduction
![Page 5: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/5.jpg)
#C1
5LV
5
EBS Function Security
![Page 6: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/6.jpg)
#C1
5LV
6
EBS Function Security
■ Forms
■ Form Functions▪ Sub functions
■ Menu▪ Sub Menu
■ Responsibility
![Page 7: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/7.jpg)
#C1
5LV
7
EBS Function Security
![Page 8: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/8.jpg)
#C1
5LV
8
Fusion Role Based Security
![Page 9: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/9.jpg)
#C1
5LV
9
Fusion Role Based Security
■ Job Roles
■ Data Roles
■ Duty Roles
■ Implementation RBAC▪ Oracle Identity Manager (OIM)▪ Authorization Policy Manager (APM)▪ Application Access Controls Governor (AACG)
![Page 10: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/10.jpg)
#C1
5LV
10
Fusion Role Based Security
![Page 11: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/11.jpg)
#C1
5LV
11
Transforming to RBAC
![Page 12: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/12.jpg)
#C1
5LV
12
Reasons to Transform to RBAC
■ Improve Security of Systems and Applications
■ Easily Make Security Changes
■ Easily Meet Audit Requirements
■ Increase Productivity of Employees
■ Reduce costs
![Page 13: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/13.jpg)
#C1
5LV
13
Function Security Vs RBAC
![Page 14: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/14.jpg)
#C1
5LV
14
Conclusion
![Page 15: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/15.jpg)
#C1
5LV
15
Conclusion
■ RBAC involves more objects than responsibility-based security
■ RBAC is slightly more complex to set up initially.
■ However, RBAC is also more powerful and flexible than using only function security.
■ Transforming to RBAC can save a lot of time and effort in the long term by making administration of individual users and groups of users easier.
![Page 16: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/16.jpg)
#C1
5LV
16
Q&A
![Page 17: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/17.jpg)
#C1
5LV
17
![Page 18: Transformation of E-Business Suite R12 security to Fusion Role Based Security](https://reader035.vdocuments.us/reader035/viewer/2022070520/58f0d5b21a28abde6f8b4587/html5/thumbnails/18.jpg)
#C1
5LV
Please complete the session evaluationWe appreciate your feedback and insight
You may complete the session evaluation either on paper or online via the mobile app