|Have you tried OracleappsHub in ipad/iphone/smart Phone? Don't wait. try it today|
Oracle User Management (OUM) is an extension to the core Oracle E-Business Suite Access Controls Model. It introduces a number of features to streamline and improve the security of user administration.
What is Oracle User Management?
This is available from EBS 11.5.10 onward as part of the license,Oracle User Management is an extension to the core Oracle E-Business Suite Security Access Controls model which enables organizations to manage users based on specific requirements such as job role or geographic location.
Companies having large number of User base utilizing Oracle’s self service based application such as iProcurement,iExpenses and self-service HR managing user account is always a resource intensive activity, which can be enhanced by usage of this.Let understand the core component of OUM.
Security & Key components
The key features of Oracle User Management can be divided into two main areas: Core Security and Administrative features.
Oracle User Management leverages the existing Application Security features, Function and Data Security, while providing the additional layer of role based access control. These Core Security layers provide the basis for Oracle User Management's administrative features: Delegated Administration, Registration Processes, and Self Service Requests & Approvals.Details are herewith:
- Core Security - Oracle's function and data security mechanisms constitute the base layers of this system, and contain the traditional system administrative capabilities. Organizations can optionally add more layers to the system depending on the degree of flexibility they require.
(1 ) Function Security - The base layer of access control within Oracle Applications is Function Security. Function Security restricts user access to the individual menus and menu options within the system.
(2) Data Security - The second layer represents Data Security. Working in conjunction with Function Security, Data Security provides additional access control on the data a user can see and what actions a user can perform on that data, within Oracle Applications. Using Data Security, for example, you could control access to the set of orders that an order administrator can update within the Order Management application.
(3) Role Based Access Control (RBAC) - The third layer represents Role Based Access Control (RBAC). The RBAC model augments the existing access control model in Oracle Applications by providing additional methods to organize data security policies and existing function security (via roles).
(4) Delegated Administration – This enables access controls administrative duties to be delegated to ‘local’ employees. This allows administrators with knowledge of local access requirements to perform simple user administration.
(5) Registration Processes – allows an organization to configure the self-service user account provisioning and access assignment processes to support their specific business requirements.
(6) Self-Service Requests and Approvals – users can select automated workflow processes to request the creation of a new user account, request additional access or reset their password.
These 6 key feature can be best described as Fig below.
Thats means user Management could reduce the cost of supporting your Oracle E-Business Suite Environment. Processes such as self-service password reset and self service account creation could enhance the operational efficiency and addresses your security and controls risks.
Other similar Post
- SAP-ORCL: “Security”
- Let Talk About Security Groups functionality available within Oracle HRMS
- OracleApps Responsibility vs SAP Functions
- Understanding Security in : Oracle Financials and Manufacturing
- Know the Security by Books in Fixed Asset
- MOAC : From Multi-Org To Multi-Access