Skip to content

Commit

Permalink
Merge branch 'oracle-livelabs:main' into main
Browse files Browse the repository at this point in the history
  • Loading branch information
LesiaChaban authored Jan 3, 2025
2 parents a3607f3 + e57d2ba commit f4aaa72
Show file tree
Hide file tree
Showing 1,173 changed files with 4,015 additions and 7,153 deletions.
66 changes: 37 additions & 29 deletions apps-cloud-adventure-cio/01-security/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,22 +4,25 @@

Welcome to Oracle’s Cloud Adventure. This is a fresh and unique way to offer you a chance for hands-on experience of highly differentiated and specifically curated content of numerous vignettes that are typically encountered in accounting and finance. We hope you will enjoy today’s adventure exploring a complete and unified solution for the office of the CIO.

### Objectives

During this adventure, you will perform a time sensitive task of granting permissions to a user.

Estimated Time: 15 minutes

Do not forget to answer the Adventure Check Point questions at the end of the exercise!

### Objectives
## ERP & SCM: Extending Privileges to a User

During this adventure, you will perform a time sensitive task of granting permissions to a user. These are the steps you will perform:
1. During this adventure, you will perform a time sensitive task of granting permissions to a user. These are the steps you will perform:

![Security Objectives](images/image100objs.png)

At this point, you should be logged into your environment with a username CIO.xx where xx is a two number code assigned to your laptop.


## Task 1: Extending Privileges to a User


1. Oracle Cloud Applications are delivered with a complete set of roles which control access to application functions and data.
2. Oracle Cloud Applications are delivered with a complete set of roles which control access to application functions and data.

To add a new privilege to a user, you will need to first copy an existing role.

Expand All @@ -28,7 +31,7 @@ At this point, you should be logged into your environment with a username CIO.xx
![Application Springboard](images/image001.png)


2. Accessing Security Console
3. Accessing Security Console

> Select the **Tools** tab menu. <br>
Expand All @@ -37,29 +40,29 @@ At this point, you should be logged into your environment with a username CIO.xx
![Tools Security Console](images/image002.png)


3. You’ll be working from this single console for most of the examples today. By default, you are viewing the Roles tab of the console.
4. You’ll be working from this single console for most of the examples today. By default, you are viewing the Roles tab of the console.

> Security Console - Roles.
![Console Top Empty](images/image003.png)

4. Notice how the search is dynamic and offers available options as you type.
5. Notice how the search is dynamic and offers available options as you type.

> In the search field provided at the top, type: **Adventure**. <br>
> Then **click** on the first entry as shown.
![Adventure Role Search](images/image004.png)

5. You can now see a list of the roles which are granted to a user when they are provided with the Accounts Payable Manager.
6. You can now see a list of the roles which are granted to a user when they are provided with the Accounts Payable Manager.

> Notice that the table may be exported to Microsoft Excel using the button provided at the top right. <br>
> (Nothing to perform here)
![Adventure Role roles](images/image005.png)

6. Always make changes to a copied role to ensure that your custom configurations are preserved on updates.
7. Always make changes to a copied role to ensure that your custom configurations are preserved on updates.

> Tasks associated with the role are available from this pull-down menu. Select **Copy Role**.
Expand All @@ -71,7 +74,7 @@ At this point, you should be logged into your environment with a username CIO.xx
![Copy Adventure Role b](images/image007.png)

7. Notice that you are provided with a list of ordered steps at the top. For this example, we will only provide answers to steps 1, 2 and 7.
8. Notice that you are provided with a list of ordered steps at the top. For this example, we will only provide answers to steps 1, 2 and 7.

We start by giving our copied role a unique name.

Expand All @@ -83,13 +86,13 @@ At this point, you should be logged into your environment with a username CIO.xx
![Copy Role a](images/image008.png)

8. Using Function Security Policy, you will add the privileges Brian Bell needs
9. Using Function Security Policy, you will add the privileges Brian Bell needs

> Press the **Add + Function Security Policy** button.
![Copy Role 2a](images/image009.png)

9. You will now find the required policy using the search form.
10. You will now find the required policy using the search form.

> Type **Cancel Supplier Negotiation** in the search field and select the policy.
Expand All @@ -99,22 +102,22 @@ At this point, you should be logged into your environment with a username CIO.xx
![Copy Role 2c](images/image011.png)

10. Note that the search window did not automatically dismiss. This is done so you can continue to add more policies in this process.
11. Note that the search window did not automatically dismiss. This is done so you can continue to add more policies in this process.

> Press the **Cancel** button to continue.
![Copy Role 2d](images/image012.png)


11. Note that the new policy has been added.
12. Note that the new policy has been added.

You will skip the next three tasks until you arrive at ‘Users (7)’ in the Copy Role process.

> **Press the 7 (Users) task at the top of the screen**.
![Copy Role 2e](images/image013.png)

12. Using a similar search tool, you will now search for Brian Bell and provide him with this new role and its associated privileges.
13. Using a similar search tool, you will now search for Brian Bell and provide him with this new role and its associated privileges.

> Press the **Add User** button.
Expand All @@ -131,44 +134,41 @@ At this point, you should be logged into your environment with a username CIO.xx
![Copy Role 7c](images/image016.png)


13. Again, the search box remains in case you want to add additional users.
14. Again, the search box remains in case you want to add additional users.

> Press the **Cancel** button.
![Copy Role 7d](images/image017.png)

14. Brian Bell has been added to this new role
15. Brian Bell has been added to this new role

> Press the **Next** button.
![Copy Role 7e](images/image018.png)

15. Note confirmation that we have added one Security Policy and one user
16. Note confirmation that we have added one Security Policy and one user

> Press the **Submit and Close** button.
![Copy Role 7f](images/image019.png)

16. Last screen confirms new role is added
17. Last screen confirms new role is added

Success!

> Press the **OK** button.
![Copy Role 7g](images/image020.png)


## Task 2: Compare Roles

1. Using the compare roles feature, you can quickly identify changes you’ve made compared to the out of the box roles provided by Oracle or other custom roles.
18. Using the compare roles feature, you can quickly identify changes you’ve made compared to the out of the box roles provided by Oracle or other custom roles.

This section uses your newly created role to do exactly this.

> From the Security Console, press the **Compare Roles button**.
![Compare Roles Launch](images/image021.png)

2. You will need to enter the name of your new role
19. You will need to enter the name of your new role

> Press the **Search** ![Search Icon](images/icon01_search.png) icon for the First Role
Expand All @@ -186,7 +186,7 @@ At this point, you should be logged into your environment with a username CIO.xx
![Compare Roles c](images/image025.png)

3. Now you will repeat these steps for the original role
20. Now you will repeat these steps for the original role

> Press the **Search** icon for the Second Role
Expand All @@ -206,13 +206,13 @@ At this point, you should be logged into your environment with a username CIO.xx
![Compare Roles F](images/image029.png)

4. Immediately you see that Cancel Supplier Negotiation has been added to the first role and does not exist in the second role.
21. Immediately you see that Cancel Supplier Negotiation has been added to the first role and does not exist in the second role.

![Compare Roles 6](images/image030.png)



5. Adventure awaits, click on the image, show what you know and rise to the top of the leader board!!!
22. Adventure awaits, click on the image, show what you know and rise to the top of the leader board!!!

[![Cloud Adventure](images/cloud-adventure-checkpoint-image.png)](https://apex.oracle.com/pls/apex/f?p=159406:LOGIN_TEAM:::::CC:CIOADVENTURE)

Expand All @@ -223,7 +223,15 @@ Security Console is used to quickly manage user access to the entire Fusion appl

**You have successfully completed the Activity!**


## Learn More

* [Oracle Supply Chain & Manufacturing - Secure](https://docs.oracle.com/en/cloud/saas/supply-chain-and-manufacturing/24d/secure.html)
* [Oracle Human Resources - Secure](https://docs.oracle.com/en/cloud/saas/human-resources/24b/secure.html)
* [Oracle Documentation](http://docs.oracle.com)


## Acknowledgements
* **Author** - Nate Weinsaft, Cloud Technologist, Advanced Technology Services
* **Contributors** -
* **Last Updated By/Date** - Nate Weinsaft, September 2024
* **Last Updated By/Date** - Nate Weinsaft, November 2024
Loading

0 comments on commit f4aaa72

Please sign in to comment.