Fusion Role Based Security Model
Fusion Role Based Security Model
What
Which Data
Employee
His own
Line Manager
Can Transfer/terminate
HR
At the beginning it sounds confusing but once you get the basic its easier
and convenient same as your responsibilities and functions in Ebiz. To understand it better lets put a
hypothetical business requirement in-front of us.
Requirement : There is a Security in chief (lets say Mr. Security) responsible for taking care of all
security measurements in your organization. He needs to be given authority to terminate any employee caught
violating security guidelines. In oracle terminology he needs to be given a new role to be able to terminate any
employee within your organization.
Now the function to terminate employee is already available with few seeded roles like Manager and HR
Specialist but you can not assign them to Mr. Security as using the seeded role Manager he would be able to
terminate only people falling under the manager hierarchy. You cannot also assign another seeded role Hr
Specialist to Mr Security as it comes with many other powerful things along with Termination.
So the only option is to create a new custom role only for terminating employees and assign it to Mr Security. In
the next steps we will see how can this be done.
Setup Steps
Now we know that we have to create a new role but what would be the
type of role as oracle fusion delivers four different types of role. So lets talk about different roles available in
fusion before we login to application and start setting things up.
Oracle Fusion Applications uses four types of roles for security management, which are given below. The first
three roles can be assigned to user directly. These roles also inherit some or other roles.
Data Roles
Data roles are combination of workers job and the data instances on which jobs can be performed. For
example, a data role Payroll Administrator Payroll UScombines a job (Payroll Administrator) with a data
instance (Payroll US). As job is the one factor it inherits Job Role and for the data, we attached a security profile
with it (will be explained later)
Job Roles
Job role aligns with the job that a worker is hired to perform. Human Resource Analyst and Payroll Manager
are examples of predefined job roles. Typically, you include job roles in data roles and assign those data roles to
users. The IT Security Manager and Application Implementation Consultant job roles are exceptions, because
they are not considered HCM job roles and do not restrict data using HCM security profiles.
Abstract Roles
Abstract roles represent a workers role in the enterprise, independently of the job that the worker is hired to
do. There are three seeded abstract roles delivered with Oracle Fusion HCM. These are the Employee, Line
Manager, and Contingent Worker roles. Abstract roles are assigned to user automatically when some event
occurs like Hire an employee, Terminate an employee or Promote an employee.
Duty Roles
Data Role aligns with the individual duties that users perform as part of their job but not assigned to user
directly. This role also grants access to work areas, dashboards, task flows, application pages, reports, batch
programs, and so on. Duty roles are inherited by job and abstract roles, and can also be inherited by other duty
roles. Needless to say we can create custom role also, if needed.
Below diagram shows how some of the role inherits other
Data roles
Abstract roles
Job roles
We can create HCM security profiles for the following HCM business objects (can be changed with future
releases)
Person
Organization
Position
Country
Document Type
Payroll
Payroll Flow
Okay, enough theory, so by now we know that for our requirement we have to create a Data Role to assign user
and that Data role should inherit a job role, which eventually inherit a duty role. We also need to create a
security profile to restrict organization and attached with Data role. Here are the steps
Click on the link Administration, top right corner. You will see a welcome page. Click on Create role (
) under Roles. And enter details as given below. Once done click on save and close the window.
Name : <Unique Name>
Now in the next page search for the role (Avi Terminate Worker) we created in OIM. In the search result section
select the Job Role and click on Open Role. You will see following screen.
On the above page click on Application Role Mapping tab and click on +Mapicon. It will bring a pop-up.
Select hcm as application and search for the role Worker Termination Duty In the search reselct section click
on the result and than click on Map Roles. Now we have successfully mapped the duty role with our job role.
This duty role will help us to terminate the worker.
You must be wondering how did I know that I have to add only Worker Termination Duty duty role with the
job role to give termination access, do we need to remember all these duty roles? Answer is NO. You can
download the mapping from oracle note Mapping Of Roles, Duties and Privileges in Fusion Applications (Doc
ID 1460486.1)
Navigation : Navigator Tools Setup and Maintenance All Tasks Tab Search for Manage Person Security
Profile
As we know we can attach security profile with Data role to give access on particular set of data. If you do not
create any security profile you can select the View All option when creating Data role. In this example we will
create a security profile based on Person Security profile.
To create a security profile search for the task Manage Person Security Profile and click on Go to task icon. A
new page will appear, in the search result section click on Create icon.
On the Create Person Security Profile page. Give it a name and select the check box Secure by Legal
employer. From the list select the legal employer for which you want Mr Security to give access to terminate
worker. Once done click on Save and close. Click Yes if when you receive warning.
In the next guided process select the security profile that you had created earlier. Once done click on Next
NOTE : If you did not follow the previous steps you can still create a security profile from here or just select the
View All from the list.
Next screen will show all security profiles associated with this data role. Click onNext again, which will bring
the Review Page. Review it once and once satisfied click on Submit.
Duty Role
Job Role
Abstract Role
Data Role
1.
Duty Roles: Data Role is also known as Application Role. Lets say a manager has a
duty of creating invoices, approving invoices or creating journals. The duty of creating
/approving invoices /journals are called Duty Roles.
.
2.
Job Roles: Job roles are also known as External Role. These roles are created in
Authorization Policy Manager (APM). Examples of these roles are Payable Accounts
Manager, Chief Financial Manager, Finance Controller, etc. Various duties will be assigned
to a Job role. In other words a Job role must have duty role. For instance Payable Accounts
Manager will have duty of creating invoices, approving invoices, running payment batch,
etc.
.
3.
4.
Data Roles: As per business need if we dont want UK ledger to be accessed by the
user in US organisation, we take the help of data role which needs to be assigned selectively.
When we create ledger or business unit, system will automatically create job role with
having access to data role. When a job role when attached with a data role, the job role
created is confined to that particular ledger or business unit. Once it is done the job role gets
the access to data, it can perform required function related to data.
.
5.
Data Access Set: Data access set is mainly related to ledger data. Lets say within a
ledger we have multiple balancing segments. On business interest we dont want to give the
access of Company 01 to the user having access to Company 02. In order to do so we have to
create few data access policies. This in turn will create a data role. In other words when we
create a ledger, by default it creates a role which has an access to the entire ledger. However
with data access set we can restrict the access to a particular balancing segment.
Below is the pictorial representation of various roles discussed above-