You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: apps-cloud-adventure-cio/01-security/security.md
+37-29Lines changed: 37 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,22 +4,25 @@
4
4
5
5
Welcome to Oracle’s Cloud Adventure. This is a fresh and unique way to offer you a chance for hands-on experience of highly differentiated and specifically curated content of numerous vignettes that are typically encountered in accounting and finance. We hope you will enjoy today’s adventure exploring a complete and unified solution for the office of the CIO.
6
6
7
+
### Objectives
8
+
9
+
During this adventure, you will perform a time sensitive task of granting permissions to a user.
10
+
7
11
Estimated Time: 15 minutes
8
12
13
+
Do not forget to answer the Adventure Check Point questions at the end of the exercise!
9
14
10
-
### Objectives
15
+
##ERP & SCM: Extending Privileges to a User
11
16
12
-
During this adventure, you will perform a time sensitive task of granting permissions to a user. These are the steps you will perform:
17
+
1.During this adventure, you will perform a time sensitive task of granting permissions to a user. These are the steps you will perform:
13
18
14
19

15
20
16
21
At this point, you should be logged into your environment with a username CIO.xx where xx is a two number code assigned to your laptop.
17
22
18
23
19
-
## Task 1: Extending Privileges to a User
20
-
21
24
22
-
1. Oracle Cloud Applications are delivered with a complete set of roles which control access to application functions and data.
25
+
2. Oracle Cloud Applications are delivered with a complete set of roles which control access to application functions and data.
23
26
24
27
To add a new privilege to a user, you will need to first copy an existing role.
25
28
@@ -28,7 +31,7 @@ At this point, you should be logged into your environment with a username CIO.xx
28
31

29
32
30
33
31
-
2. Accessing Security Console
34
+
3. Accessing Security Console
32
35
33
36
> Select the **Tools** tab menu. <br>
34
37
@@ -37,29 +40,29 @@ At this point, you should be logged into your environment with a username CIO.xx
37
40

38
41
39
42
40
-
3. You’ll be working from this single console for most of the examples today. By default, you are viewing the Roles tab of the console.
43
+
4. You’ll be working from this single console for most of the examples today. By default, you are viewing the Roles tab of the console.
41
44
42
45
> Security Console - Roles.
43
46
44
47

45
48
46
-
4. Notice how the search is dynamic and offers available options as you type.
49
+
5. Notice how the search is dynamic and offers available options as you type.
47
50
48
51
> In the search field provided at the top, type: **Adventure**. <br>
49
52
50
53
> Then **click** on the first entry as shown.
51
54
52
55

53
56
54
-
5. You can now see a list of the roles which are granted to a user when they are provided with the Accounts Payable Manager.
57
+
6. You can now see a list of the roles which are granted to a user when they are provided with the Accounts Payable Manager.
55
58
56
59
> Notice that the table may be exported to Microsoft Excel using the button provided at the top right. <br>
57
60
58
61
> (Nothing to perform here)
59
62
60
63

61
64
62
-
6. Always make changes to a copied role to ensure that your custom configurations are preserved on updates.
65
+
7. Always make changes to a copied role to ensure that your custom configurations are preserved on updates.
63
66
64
67
> Tasks associated with the role are available from this pull-down menu. Select **Copy Role**.
65
68
@@ -71,7 +74,7 @@ At this point, you should be logged into your environment with a username CIO.xx
71
74
72
75

73
76
74
-
7. Notice that you are provided with a list of ordered steps at the top. For this example, we will only provide answers to steps 1, 2 and 7.
77
+
8. Notice that you are provided with a list of ordered steps at the top. For this example, we will only provide answers to steps 1, 2 and 7.
75
78
76
79
We start by giving our copied role a unique name.
77
80
@@ -83,13 +86,13 @@ At this point, you should be logged into your environment with a username CIO.xx
83
86
84
87

85
88
86
-
8. Using Function Security Policy, you will add the privileges Brian Bell needs
89
+
9. Using Function Security Policy, you will add the privileges Brian Bell needs
87
90
88
91
> Press the **Add + Function Security Policy** button.
89
92
90
93

91
94
92
-
9. You will now find the required policy using the search form.
95
+
10. You will now find the required policy using the search form.
93
96
94
97
> Type **Cancel Supplier Negotiation** in the search field and select the policy.
95
98
@@ -99,22 +102,22 @@ At this point, you should be logged into your environment with a username CIO.xx
99
102
100
103

101
104
102
-
10. Note that the search window did not automatically dismiss. This is done so you can continue to add more policies in this process.
105
+
11. Note that the search window did not automatically dismiss. This is done so you can continue to add more policies in this process.
103
106
104
107
> Press the **Cancel** button to continue.
105
108
106
109

107
110
108
111
109
-
11. Note that the new policy has been added.
112
+
12. Note that the new policy has been added.
110
113
111
114
You will skip the next three tasks until you arrive at ‘Users (7)’ in the Copy Role process.
112
115
113
116
> **Press the 7 (Users) task at the top of the screen**.
114
117
115
118

116
119
117
-
12. Using a similar search tool, you will now search for Brian Bell and provide him with this new role and its associated privileges.
120
+
13. Using a similar search tool, you will now search for Brian Bell and provide him with this new role and its associated privileges.
118
121
119
122
> Press the **Add User** button.
120
123
@@ -131,44 +134,41 @@ At this point, you should be logged into your environment with a username CIO.xx
131
134

132
135
133
136
134
-
13. Again, the search box remains in case you want to add additional users.
137
+
14. Again, the search box remains in case you want to add additional users.
135
138
136
139
> Press the **Cancel** button.
137
140
138
141

139
142
140
-
14. Brian Bell has been added to this new role
143
+
15. Brian Bell has been added to this new role
141
144
142
145
> Press the **Next** button.
143
146
144
147

145
148
146
-
15. Note confirmation that we have added one Security Policy and one user
149
+
16. Note confirmation that we have added one Security Policy and one user
147
150
148
151
> Press the **Submit and Close** button.
149
152
150
153

151
154
152
-
16. Last screen confirms new role is added
155
+
17. Last screen confirms new role is added
153
156
154
157
Success!
155
158
156
159
> Press the **OK** button.
157
160
158
161

159
162
160
-
161
-
## Task 2: Compare Roles
162
-
163
-
1. Using the compare roles feature, you can quickly identify changes you’ve made compared to the out of the box roles provided by Oracle or other custom roles.
163
+
18. Using the compare roles feature, you can quickly identify changes you’ve made compared to the out of the box roles provided by Oracle or other custom roles.
164
164
165
165
This section uses your newly created role to do exactly this.
166
166
167
167
> From the Security Console, press the **Compare Roles button**.
168
168
169
169

170
170
171
-
2. You will need to enter the name of your new role
171
+
19. You will need to enter the name of your new role
172
172
173
173
> Press the **Search** icon for the First Role
174
174
@@ -186,7 +186,7 @@ At this point, you should be logged into your environment with a username CIO.xx
186
186
187
187

188
188
189
-
3. Now you will repeat these steps for the original role
189
+
20. Now you will repeat these steps for the original role
190
190
191
191
> Press the **Search** icon for the Second Role
192
192
@@ -206,13 +206,13 @@ At this point, you should be logged into your environment with a username CIO.xx
206
206
207
207

208
208
209
-
4. Immediately you see that Cancel Supplier Negotiation has been added to the first role and does not exist in the second role.
209
+
21. Immediately you see that Cancel Supplier Negotiation has been added to the first role and does not exist in the second role.
210
210
211
211

212
212
213
213
214
214
215
-
5. Adventure awaits, click on the image, show what you know and rise to the top of the leader board!!!
215
+
22. Adventure awaits, click on the image, show what you know and rise to the top of the leader board!!!
0 commit comments