Oracle Cloud offers a broad portfolio of software as a service applications, platform as a service, and social capabilities, all on a subscription basis. Oracle Cloud delivers instant value and productivity for end users, administrators, and developers alike through functionally rich, integrated, secure, enterprise cloud services.
 Get a Free Magzine ...Profit:The Executive's Guide to Oracle Applications

Subscribe to the OracleAppsHub to receive notifications when there are new posts:

 get RSS feed
 Oracle Fusion Applications (OFA) is a portfolio of next generation suite of software applications from Oracle Corporation. It is distributed across various product families; including financial management, human capital management, customer relationship management, supply chain management, procurement, governance, and project portfolio management
 Get a Free Magzine ...Profit:The Executive's Guide to Oracle Applications

Security : Oracle Audit Vault

Posted on August 15th, 2011 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

In security series, lets know another product.

Oracle Audit Vault is a security product that automates the consolidation of audit data into a secure repository, enabling efficient monitoring and reporting. This makes Oracle Audit Vault is a powerful solution providing a secure repository, built-in reporting, event alerting.This uses Oracle data security to protect audit data end-to-end. It helps to:

  • Consolidate and secure audit data from multiple instances of these databases – Oracle, Microsoft SQL Server, Sybase, IBM DB2.
  • Oracle Audit Vault is having out-of-the box compliance reports such as SOX, PCI and HIPAA requirements.
  • This also have entitlement reports for Oracle database to showing users, privileges and roles.
  • Policies can be created for SQL statements, schema objects, database privileges like alter, create, drop, grant etc.
  • Oracle Audit Vault raise alerts for suspicious activity on sensitive data like employee salaries, credit card numbers etc.
  • This have feature to capture before/after data value changes from Oracle database transaction logs.
  • Audit Vault can be administered and managed separately through Audit Vault server and Console

Oracle Audit Vault

Read the rest of this entry »

Posted in Oracle Application | 2 Comments »

Secuity : Oracle Internal Controls Manager

Posted on August 13th, 2011 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

Do you know , Oracle Internal Controls Manager (OICM) is a comprehensive tool for executives, controllers, internal audit departments, and public accounting firms to document and test internal controls and monitor ongoing compliance. This tool is based on COSO (Committee of Sponsoring Organizations) standards.

Read the rest of this entry »

Posted in Oracle Application | No Comments »

Security : User Management Roles (UMX)

Posted on August 13th, 2011 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

Oracle User Management (UMX) enables organizations to define administrative functions and manage users based on specific requirements such as job role or geographic location.

A Role in UMX schema can be best understood as a job function within the context of an organization with associated semantics regarding the authority and responsibility conferred on the user assigned to the role .

Typical characteristics of Role are - Navigation menus and Access permissions can be separate, and Roles are hierarchical. Because of which responsibilities can be shared with multiple roles and Roles can be built on top of each other, with minimal effort.

Oracle Role Based Access Control (RBAC) and Data Security enables permission assignments to secure a subset of data on the database objects such as vendors, projects, customers, application users etc which can be easily done by creating data security policies .

Typically if you combine all key component, the best it can be described as fig below:

EBS Security UMX

Delegated and Local administrators can be given administrative privileges with a subset of users and people to manage. They can be given different set of administrator privileges. The delegated administrator privileges can be implemented by selecting the Role to which it can be assigned.

You can Navigate the security Wizard as :

Run Wizard (I) of “User Management: Security Administration Setup” -> User Administration (T) -> Add More Rows (B).

The User Management: Security Administration Setup wizard is a security function that defines the administration privileges for administrators that assign/revoke user accounts and roles.

This wizard has 3 sub-tabs:

  • User Administration,
  • Organization Administration
  • and Role Administration

UMX also comes with pre-defined Self-service Registration tasks for users to request new accounts and additional access to the system.

Last but the least, there is Proxy user functionality available in R12 that provides a user with the ability to delegate his/her functions to individuals, to act on behalf of the delegator. How this sounds :)

Posted in Oracle Application | No Comments »

Security :Oracle User Management

Posted on August 11th, 2011 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

Oracle User Management (OUM) is an extension to the core Oracle E-Business Suite Access Controls Model. It introduces a number of features to streamline and improve the security of user administration.

dgreybarrow What is Oracle User Management?

This is available from EBS 11.5.10 onward as part of the license,Oracle User Management is an extension to the core Oracle E-Business Suite Security Access Controls model which enables organizations to manage users based on specific requirements such as job role or geographic location.

Companies having large number of User base utilizing Oracle’s self service based application such as iProcurement,iExpenses and self-service HR managing user account is always a resource intensive activity, which can be enhanced by usage of this.Let understand the core component of OUM.

dgreybarrow Security & Key components

The key features of Oracle User Management can be divided into two main areas: Core Security and Administrative features.

Oracle User Management leverages the existing Application Security features, Function and Data Security, while providing the additional layer of role based access control. These Core Security layers provide the basis for Oracle User Management's administrative features: Delegated Administration, Registration Processes, and Self Service Requests & Approvals.Details are herewith:

  1. Core Security - Oracle's function and data security mechanisms constitute the base layers of this system, and contain the traditional system administrative capabilities. Organizations can optionally add more layers to the system depending on the degree of flexibility they require.

    (1 ) Function Security - The base layer of access control within Oracle Applications is Function Security. Function Security restricts user access to the individual menus and menu options within the system.

    (2) Data Security - The second layer represents Data Security. Working in conjunction with Function Security, Data Security provides additional access control on the data a user can see and what actions a user can perform on that data, within Oracle Applications. Using Data Security, for example, you could control access to the set of orders that an order administrator can update within the Order Management application.

    (3) Role Based Access Control (RBAC) - The third layer represents Role Based Access Control (RBAC). The RBAC model augments the existing access control model in Oracle Applications by providing additional methods to organize data security policies and existing function security (via roles).

  2. Administrative Featured

(4) Delegated Administration – This enables access controls administrative duties to be delegated to ‘local’ employees. This allows administrators with knowledge of local access requirements to perform simple user administration.

(5) Registration Processes – allows an organization to configure the self-service user account provisioning and access assignment processes to support their specific business requirements.

(6) Self-Service Requests and Approvals – users can select automated workflow processes to request the creation of a new user account, request additional access or reset their password.

These 6 key feature can be best described as Fig below.

Oracle User Management

Thats means user Management could reduce the cost of supporting your Oracle E-Business Suite Environment. Processes such as self-service password reset and self service account creation could enhance the operational efficiency and addresses your security and controls risks.

dgreybarrow Other similar Post

Posted in Oracle Application | 1 Comment »

Security Profile Options in Managing a Secure Oracle Applications Environment

Posted on July 31st, 2011 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

These Profile are recomended by Oracle strongly in secureing configuration of Oracle E-Business Suite production systems.

  • FND Validation Level : Provides in depth defense against parameter and URL tampering.

Recommended Setting: ERROR

  • ICX: Session Timeout :Idle Session Timeout. The numeric value greater than 4 (in minutes) that a SSWA session can be idle before expiring. A 0/NULL will disable timeout.

This profile option determines the length of time (in minutes) of inactivity in a user's form session before the session is disabled. Once session is disabled , the user is provided the opportunity to re-authenticate and re-enable their timed-out session. If the reauthentication is successful, the disabled session is re-enabled and no work is lost. Otherwise, the session is terminated without saving pending work.

Recommended Setting: 30 min

  • ICX: Limit Time :Absolute maximum length of time (in hours) of any user session, active or inactive.

This profile defines the maximum connection time for a connection – regardless of user activity.
If 'ICX:Session Timeout' is set to NULL, then the session will last only as long as 'ICX: Limit Time', regardless of user activity.

  • Signon Password Failure Limit :A positive integer to limit maximum number of logon attempts before the user's account is disabled.
  • Restrict text Input :Detects Cross Site Scripting(XSS) and other HTML injection attacks by hackers which gives access to your website and database.

Recommended Setting: Yes

  • Utilities:Diagnostics :Value determines whether diagnostic utilities, such as Help -> Tools -> Examine, may be used.

Set to No, to disable a user to view any internal form field.

Posted in Oracle Application, Security | No Comments »

Oracle’s solution for Attestation/Recertification process

Posted on March 28th, 2011 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

dgreybarrow What is Attestation

In any big organization, it is important to be able to answer questions like “Who has access to What, When, How and Why” in order to comply with regulatory requirements like Sarbanes-Oxley, HIPPA etc. This necessitates the existence of some auditing mechanism within the organization.

Attestation describes any certification review process where an individual swears to or witness/confirm something important. This term is almost similar and used to describe a review/certification process that requires resource owners to verify their authorized users during on an on-going basis. This on-going process

dgreybarrow Process and Oracle Solutioning

Attestation sometime also referred to as recertification, is key part of SOX .Majority of enterprises are meeting these attestation requirements today largely with manual processes based on spreadsheet reports and emails. These manual processes tend to be fragmented, are difficult and expensive to manage, and have little data integrity and audit ability.

Oracle Identity Analytics offers a best-in-class attestation feature that can be deployed quickly to enable an enterprise-wide attestation process that features automated report generation, delivery and notification. Attestation reviewers can review fine-grained access reports within an interactive user interface that supports fine-grained certify, reject, decline, and delegate actions. All report data and reviewers’ actions are captured for future auditing needs. Reviewer actions can optionally trigger corrective action by connecting with Oracle Identity Manger’s workflow engine for remediation.

Posted in Security | No Comments »

Maintenance Wizard in OracleApps

Posted on February 13th, 2011 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

Oracle Support provides Maintenance Wizard is a free Tool(Mostly used by DBA) that guide you through the upgrade of Oracle Applications technology stack and products from Release 11i versions to Release 12. Some of the important high point for Maintenance Wizard in Oracle EBS are:

  • Maintenance Wizard is a self-service tool that guides customers in a methodical and repeatable way through the upgrade process.
    • Presents a consolidated, personalized set of instructions in a step-by-step format
    • Validation of important activities
    • Maintains log and status information for all tasks
    • Downloads, merges, and installs many required patches automatically
  • It is provided FREE for Oracle Applications customers who have a standard Product Services contract with Oracle.
  • Maintenance Wizard is supported the same way as any other Oracle product
  • This was formerly Known as Upgrade Assistant
  • This also provides project management utilities to record the time taken for each task and completion status

Maintenance Wizard helps you to reduce upgrade tasks by dynamically filtering the necessary steps based on criteria it obtains from your Applications environment. The resulting report is a set of step-by-step instructions of exactly what you need to do to complete your specific upgrade, including any critical patches that your system may require. It can also automatically execute many of the tasks for you, so as to reduce the possibility of errors or accidental omission of vital tasks

dgreybarrow Post for your Interest on subject Line

  • Note 215527.1 - 'Maintenance Wizard Overview'
  • Note.251253.1 Ext/Pub Maintenance Wizard FAQ
  • Note.248708.1 Int/Pub Authoring Wizard Frequently Asked Questions (FAQ) and Known Issues
  • Note.741129.1 Ext/Pub How to Use Patch Wizard Without Setting up Internet Connection

Posted in Oracle Application | No Comments »

Credit Card Transactions in Iexpense -> Accounting for Credit Card Transactions (Part II)

Posted on February 4th, 2011 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

In previous Post you have seen different options for Credit Card payment selection, here we are going to details about the accounting entry under different payment options option is used.

dgreybarrow Where is recording

Normally , the payment to the credit card company will result in a decrease in the Cash account. This can be achieved by crediting Cash. The debit amount or amounts will depend on whether the credit card transactions were previously entered in the accounting records.

For example, if the credit card purchases had not been previously entered, then there will be debits to the accounts that are appropriate for the charges. Let’s assume that credit card transaction was for an Confrence Trip . That amount might be debited to Confrence Trip Expense. If the this time credit card transactions were for airline tickets and hotels, you might debit the account Travel Expenses for those amounts.

However, it is possible that the credit card bill was recorded in the accounts prior to paying the credit card bill. Using the example above, the accountant may have debited Confrence Trip Expenses and Travel Expense, and credited Credit Card Payable at the time the bill or statement was received. If the credit card bill is paid two weeks later, the payment will be recorded with a debit to Credit Card Payable and a credit to Cash.

dgreybarrow Expenses Clearing Account

This account is required when you use the Company Pay payment option of Oracle Internet Expenses. Payables uses this as a temporary account to record credit card transaction activity. Payables debits this account when you create an invoice to pay a credit card issuer for credit card transactions. Payables credits this account with offsets to the original debit entries when you submit Expense Report Import for an employee expense report entered in Internet Expenses that has credit card transactions on it.

dgreybarrow Accounting for Credit Card Transactions

In previous Post you have seen different options for Credit Card selection, lets see the accounting entry under different payment option. In order to get indepth, lets assume a user have booked a expense report of $1150 and those were created with these details:

  • Cash and Other Expenses: $500
  • Credit Card Business Expenses: $650
  • Credit Card Personal Expenses: $299

Read the rest of this entry »

Posted in Oracle Application | No Comments »

Credit Card Transactions in Iexpense -> Process Flows

Posted on February 2nd, 2011 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

During implementation of Internet Expenses, a company have to make a decision as to how the payment towards credit card expenses will be made. Oracle as product has three standard offering which is based out of 3 model in which they can choose any one of them , as described below:

Read the rest of this entry »

Posted in Oracle Application | 1 Comment »

Metalink/Oracle Support now gives choice of SR severity

Posted on November 20th, 2010 by Sanjit Anand |Print This Post Print This Post |Email This Post Email This Post

Logged a TAR(SR) after a long time, did notice a Oracle asking key-in the severity level , that sounds really a great. Earlier the severity was set by Oracle based out of certain ceriteria expect 1 . No more requirement to call your Oracle sales staff /Global Customer Support (GCS)to raise the SR severity.

Default severity seems to be 3 and 1 still need answer of one question before you key-in the primary and secondary details.

MySupport Severity

Hope with this new options from requstor may help Oracle support to understand the user periority.

Posted in Oracle Application | No Comments »

Page 3 of 6123456

« Previous Entries Next Entries »