SlideShare a Scribd company logo
1 of 44
 
Explain the Managing Security for Oracle Application 1 Explain the components of Responsibility 2 3 Create and show set up steps: Data Group Application User Menu Request Security Group Responsibility Menu Request Set Request Group
 
Explain the Managing Security for Oracle Application 1 Responsibility Oracle  Application Windows Reports USER
Explain the Managing Security for Oracle Application 1
Explain the Managing Security for Oracle Application 1 Using  Custom  Responsibility Using  Predefined  Responsibility Using Responsibilities Define/Modify   Data Group Define/Modify   Menu Define/Modify Request Group Define Application User Assign to User Define/Modify   Responsibility Exclude Functions & Menu Define Application User
 
Explain the components of Responsibility 2 1. Data Group 3. Request Security Group 2. Menu Exclusion
Explain the components of Responsibility 2 What is a Data Group? ,[object Object],[object Object],[object Object],[object Object],Purpose of  Data Group
Explain the components of Responsibility 2
Explain the components of Responsibility 2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Explain the components of Responsibility 2 Identify menu needs Print function security report for  similar existing menus Defining a New Menu Structure similar existing menus Start with a blank menu form Print a function security report set to  document the new menu Build the menu from bottom to top Plan the menu structure Assign to the responsibility
Explain the components of Responsibility 2 Exiting Menu Structures Function Security Menu Report Function Security Navigator Report Function Security Function Report
Explain the components of Responsibility 2 1 2 3 4 5 6
Explain the components of Responsibility 2 7 8
Explain the components of Responsibility 2 Function Security Menu Report
Explain the components of Responsibility 2 Function Security Navigator Report
Explain the components of Responsibility 2 Function Security Function Report
Explain the components of Responsibility 2 Defining a New Menu Structure Identify menu needs Print function security report for  similar existing menus Start with a blank menu form Print a function security report set to  document the new menu Build the menu from bottom to top Plan the menu structure Assign to the responsibility
Explain the components of Responsibility 2 Menu Guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object]
Explain the components of Responsibility 2 Identify menu needs Print function security report for  similar existing menus Start with a blank menu form Print a function security report set to  document the new menu Build the menu from bottom to top Plan the menu structure Assign to the responsibility Defining a New Menu Structure
Explain the components of Responsibility 2 Request groups can include: ,[object Object],[object Object],[object Object],[object Object]
Explain the components of Responsibility 2
Create and show set up steps for 3 Application User Responsibility Menu Request Set Request Group
Create and show set up steps  3
Summary Requirement Please check all option User   Khemanit Arerak Pakorn Responsibility Name G3 FINANCIAL OFFICER G3_PROJECT PLANNING ANALYST G3_IMPLEMENTER DataGroup Name Standard Standard G3 Implementer Data Group Application General Ledger General Ledger G3 Implementer Application Request Group G3 Financial Officer G3_Project Planning Analyst G3 Implementer Menu Name G3 FINANCIAL OFFICER G3_PROJECT_PLAN_ANALYST G3_IM_SETUP_GL Level 1 G3 FINANCIAL OFFICER G3_PROJECT_PLAN_ANALYST G3_IM_SETUP_GL Level 2 G3 JOURNAL G3_BUDGET G3_IM_FIN G3 INQUIRY G3_REPORT G3_IM_S_SECUR G3 REPORT G3_INQUIRY G3_IM_S_APPLI   G3_FINANCIAL REPORT G3_IM_S_REQUESTS     G3_IM_S_PROFINE Level 3 G3 DEFINE G3_DEFINE G3_IM_FLEX G3 GENERATE G3_GENERATE G3 RUNFINANCIAL_RE GE_ENTER   G3_FINANCIAL REPORT   G3_FINANCIAL REPORT   G3_DEFINE FIN Level 4     G3_IM_CURR     G3_IM_CAL     G3_IM_VALIDATION     G3_IM_KEY     G3_IM_ACC     G3_IM_SEQ     G3_IM_JOUR     G3_IM_S_UER     G3_IM_S_RESP     G3_IM_S_DATA_G
Responsibility Component – Data Group Standard Data Group
4 3 (N) Security -> Oracle -> DataGroup 1 2
(N) Requests -> Set 3 1 2
1 2 3 4 (N) Requests -> Set
(N) Security -> Responsibility -> Request
 
(N) Application -> Menu
Menu Level 3
Menu Level 2
Menu Level 1
 
 
Please check menu again
1 2 3 4 6 Optional Require Require 5 (N) Security -> Responsibility -> Define
 
Company  Logo (N) Security -> User -> Define 1 2 3
 
Thank You !

More Related Content

Viewers also liked

Software Engineering - 01. Introduction
Software Engineering - 01. IntroductionSoftware Engineering - 01. Introduction
Software Engineering - 01. IntroductionArry Arman
 
Lecture 01 Introduction to Software Engineering
Lecture 01 Introduction to Software EngineeringLecture 01 Introduction to Software Engineering
Lecture 01 Introduction to Software EngineeringAchmad Solichin
 
software project management Waterfall model
software project management Waterfall modelsoftware project management Waterfall model
software project management Waterfall modelREHMAT ULLAH
 
Database administrator
Database administratorDatabase administrator
Database administratorTech_MX
 
Database Security
Database SecurityDatabase Security
Database Securityalraee
 
Intruduction conditional statement
Intruduction conditional statementIntruduction conditional statement
Intruduction conditional statementKhwaja Agha Karimi
 
Oracle Database Overview
Oracle Database OverviewOracle Database Overview
Oracle Database Overviewhonglee71
 
Agile vs Iterative vs Waterfall models
Agile vs Iterative vs Waterfall models Agile vs Iterative vs Waterfall models
Agile vs Iterative vs Waterfall models Marraju Bollapragada V
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing BasicsBelal Raslan
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Alaa' Amr Amin
 
1-Introduction to Software Engineering (Object Oriented Software Engineering ...
1-Introduction to Software Engineering (Object Oriented Software Engineering ...1-Introduction to Software Engineering (Object Oriented Software Engineering ...
1-Introduction to Software Engineering (Object Oriented Software Engineering ...Hafiz Ammar Siddiqui
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Viewers also liked (20)

Software Engineering - 01. Introduction
Software Engineering - 01. IntroductionSoftware Engineering - 01. Introduction
Software Engineering - 01. Introduction
 
Report Manager in Oracle EBS R12
Report Manager in Oracle EBS R12Report Manager in Oracle EBS R12
Report Manager in Oracle EBS R12
 
Lecture 01 Introduction to Software Engineering
Lecture 01 Introduction to Software EngineeringLecture 01 Introduction to Software Engineering
Lecture 01 Introduction to Software Engineering
 
CONDITIONAL STATEMENT IN C LANGUAGE
CONDITIONAL STATEMENT IN C LANGUAGECONDITIONAL STATEMENT IN C LANGUAGE
CONDITIONAL STATEMENT IN C LANGUAGE
 
software project management Waterfall model
software project management Waterfall modelsoftware project management Waterfall model
software project management Waterfall model
 
Database administrator
Database administratorDatabase administrator
Database administrator
 
Database Security
Database SecurityDatabase Security
Database Security
 
Intruduction conditional statement
Intruduction conditional statementIntruduction conditional statement
Intruduction conditional statement
 
Oracle Database Overview
Oracle Database OverviewOracle Database Overview
Oracle Database Overview
 
Agile vs Iterative vs Waterfall models
Agile vs Iterative vs Waterfall models Agile vs Iterative vs Waterfall models
Agile vs Iterative vs Waterfall models
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
 
1-Introduction to Software Engineering (Object Oriented Software Engineering ...
1-Introduction to Software Engineering (Object Oriented Software Engineering ...1-Introduction to Software Engineering (Object Oriented Software Engineering ...
1-Introduction to Software Engineering (Object Oriented Software Engineering ...
 
Database Administratore
Database AdministratoreDatabase Administratore
Database Administratore
 
Introduction to Database SQL & PL/SQL
Introduction to Database SQL & PL/SQLIntroduction to Database SQL & PL/SQL
Introduction to Database SQL & PL/SQL
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Manageing security

G3 manageing seucrity_setupstep_final
G3 manageing seucrity_setupstep_finalG3 manageing seucrity_setupstep_final
G3 manageing seucrity_setupstep_finalsakpob
 
Oracle Payables R12 ivas
Oracle Payables R12 ivasOracle Payables R12 ivas
Oracle Payables R12 ivasAli Ibrahim
 
cuACS Requirements Analysis Document Nicholas Aubé.docx
cuACS Requirements Analysis Document Nicholas Aubé.docxcuACS Requirements Analysis Document Nicholas Aubé.docx
cuACS Requirements Analysis Document Nicholas Aubé.docxdorishigh
 
ObjectivesUse inheritance to create base and child classes.docx
ObjectivesUse inheritance to create base and child classes.docxObjectivesUse inheritance to create base and child classes.docx
ObjectivesUse inheritance to create base and child classes.docxmccormicknadine86
 
Oracle Purchasing ivas
Oracle Purchasing ivasOracle Purchasing ivas
Oracle Purchasing ivasAli Ibrahim
 
Oracle Concurrent Program Setup document
Oracle Concurrent Program Setup  documentOracle Concurrent Program Setup  document
Oracle Concurrent Program Setup documentvenkatesh gurusamy
 
fdocuments.in_receivables-full.pdf
fdocuments.in_receivables-full.pdffdocuments.in_receivables-full.pdf
fdocuments.in_receivables-full.pdfAdnanAhmar2
 
Oracle Fixed assets ivas
Oracle Fixed assets ivasOracle Fixed assets ivas
Oracle Fixed assets ivasAli Ibrahim
 
Oracle Receivables ivas
Oracle Receivables ivasOracle Receivables ivas
Oracle Receivables ivasAli Ibrahim
 
Plant performance monitor
Plant performance monitorPlant performance monitor
Plant performance monitorsayedshiban
 
Srs dispensary-management
Srs dispensary-managementSrs dispensary-management
Srs dispensary-managementStayTuned3
 
Contact management system
Contact management systemContact management system
Contact management systemSHARDA SHARAN
 
SRS (Latest).pdf
SRS (Latest).pdfSRS (Latest).pdf
SRS (Latest).pdfAsraNadeem4
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Managementeasy2comply
 
Enerit ISO 50001 Administration Guide
Enerit ISO 50001 Administration GuideEnerit ISO 50001 Administration Guide
Enerit ISO 50001 Administration GuideArantico Ltd
 

Similar to Manageing security (20)

G3 manageing seucrity_setupstep_final
G3 manageing seucrity_setupstep_finalG3 manageing seucrity_setupstep_final
G3 manageing seucrity_setupstep_final
 
Oracle Payables R12 ivas
Oracle Payables R12 ivasOracle Payables R12 ivas
Oracle Payables R12 ivas
 
cuACS Requirements Analysis Document Nicholas Aubé.docx
cuACS Requirements Analysis Document Nicholas Aubé.docxcuACS Requirements Analysis Document Nicholas Aubé.docx
cuACS Requirements Analysis Document Nicholas Aubé.docx
 
Group 9 SRS
Group 9 SRSGroup 9 SRS
Group 9 SRS
 
ObjectivesUse inheritance to create base and child classes.docx
ObjectivesUse inheritance to create base and child classes.docxObjectivesUse inheritance to create base and child classes.docx
ObjectivesUse inheritance to create base and child classes.docx
 
Oracle Purchasing ivas
Oracle Purchasing ivasOracle Purchasing ivas
Oracle Purchasing ivas
 
Oracle Concurrent Program Setup document
Oracle Concurrent Program Setup  documentOracle Concurrent Program Setup  document
Oracle Concurrent Program Setup document
 
fdocuments.in_receivables-full.pdf
fdocuments.in_receivables-full.pdffdocuments.in_receivables-full.pdf
fdocuments.in_receivables-full.pdf
 
Oracle Fixed assets ivas
Oracle Fixed assets ivasOracle Fixed assets ivas
Oracle Fixed assets ivas
 
Oracle Receivables ivas
Oracle Receivables ivasOracle Receivables ivas
Oracle Receivables ivas
 
Plant performance monitor
Plant performance monitorPlant performance monitor
Plant performance monitor
 
Srs dispensary-management
Srs dispensary-managementSrs dispensary-management
Srs dispensary-management
 
Home Help App
Home Help AppHome Help App
Home Help App
 
Android menus in android-chapter15
Android menus in android-chapter15Android menus in android-chapter15
Android menus in android-chapter15
 
Contact management system
Contact management systemContact management system
Contact management system
 
SRS (Latest).pdf
SRS (Latest).pdfSRS (Latest).pdf
SRS (Latest).pdf
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Management
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Enerit ISO 50001 Administration Guide
Enerit ISO 50001 Administration GuideEnerit ISO 50001 Administration Guide
Enerit ISO 50001 Administration Guide
 
Android action bar and notifications-chapter16
Android action bar and notifications-chapter16Android action bar and notifications-chapter16
Android action bar and notifications-chapter16
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Manageing security

  • 1.  
  • 2. Explain the Managing Security for Oracle Application 1 Explain the components of Responsibility 2 3 Create and show set up steps: Data Group Application User Menu Request Security Group Responsibility Menu Request Set Request Group
  • 3.  
  • 4. Explain the Managing Security for Oracle Application 1 Responsibility Oracle Application Windows Reports USER
  • 5. Explain the Managing Security for Oracle Application 1
  • 6. Explain the Managing Security for Oracle Application 1 Using Custom Responsibility Using Predefined Responsibility Using Responsibilities Define/Modify Data Group Define/Modify Menu Define/Modify Request Group Define Application User Assign to User Define/Modify Responsibility Exclude Functions & Menu Define Application User
  • 7.  
  • 8. Explain the components of Responsibility 2 1. Data Group 3. Request Security Group 2. Menu Exclusion
  • 9.
  • 10. Explain the components of Responsibility 2
  • 11.
  • 12. Explain the components of Responsibility 2 Identify menu needs Print function security report for similar existing menus Defining a New Menu Structure similar existing menus Start with a blank menu form Print a function security report set to document the new menu Build the menu from bottom to top Plan the menu structure Assign to the responsibility
  • 13. Explain the components of Responsibility 2 Exiting Menu Structures Function Security Menu Report Function Security Navigator Report Function Security Function Report
  • 14. Explain the components of Responsibility 2 1 2 3 4 5 6
  • 15. Explain the components of Responsibility 2 7 8
  • 16. Explain the components of Responsibility 2 Function Security Menu Report
  • 17. Explain the components of Responsibility 2 Function Security Navigator Report
  • 18. Explain the components of Responsibility 2 Function Security Function Report
  • 19. Explain the components of Responsibility 2 Defining a New Menu Structure Identify menu needs Print function security report for similar existing menus Start with a blank menu form Print a function security report set to document the new menu Build the menu from bottom to top Plan the menu structure Assign to the responsibility
  • 20.
  • 21. Explain the components of Responsibility 2 Identify menu needs Print function security report for similar existing menus Start with a blank menu form Print a function security report set to document the new menu Build the menu from bottom to top Plan the menu structure Assign to the responsibility Defining a New Menu Structure
  • 22.
  • 23. Explain the components of Responsibility 2
  • 24. Create and show set up steps for 3 Application User Responsibility Menu Request Set Request Group
  • 25. Create and show set up steps 3
  • 26. Summary Requirement Please check all option User   Khemanit Arerak Pakorn Responsibility Name G3 FINANCIAL OFFICER G3_PROJECT PLANNING ANALYST G3_IMPLEMENTER DataGroup Name Standard Standard G3 Implementer Data Group Application General Ledger General Ledger G3 Implementer Application Request Group G3 Financial Officer G3_Project Planning Analyst G3 Implementer Menu Name G3 FINANCIAL OFFICER G3_PROJECT_PLAN_ANALYST G3_IM_SETUP_GL Level 1 G3 FINANCIAL OFFICER G3_PROJECT_PLAN_ANALYST G3_IM_SETUP_GL Level 2 G3 JOURNAL G3_BUDGET G3_IM_FIN G3 INQUIRY G3_REPORT G3_IM_S_SECUR G3 REPORT G3_INQUIRY G3_IM_S_APPLI   G3_FINANCIAL REPORT G3_IM_S_REQUESTS     G3_IM_S_PROFINE Level 3 G3 DEFINE G3_DEFINE G3_IM_FLEX G3 GENERATE G3_GENERATE G3 RUNFINANCIAL_RE GE_ENTER   G3_FINANCIAL REPORT   G3_FINANCIAL REPORT   G3_DEFINE FIN Level 4     G3_IM_CURR     G3_IM_CAL     G3_IM_VALIDATION     G3_IM_KEY     G3_IM_ACC     G3_IM_SEQ     G3_IM_JOUR     G3_IM_S_UER     G3_IM_S_RESP     G3_IM_S_DATA_G
  • 27. Responsibility Component – Data Group Standard Data Group
  • 28. 4 3 (N) Security -> Oracle -> DataGroup 1 2
  • 29. (N) Requests -> Set 3 1 2
  • 30. 1 2 3 4 (N) Requests -> Set
  • 31. (N) Security -> Responsibility -> Request
  • 32.  
  • 37.  
  • 38.  
  • 40. 1 2 3 4 6 Optional Require Require 5 (N) Security -> Responsibility -> Define
  • 41.  
  • 42. Company Logo (N) Security -> User -> Define 1 2 3
  • 43.  

Editor's Notes

  1. Security Concept ใน Oracle Application System Administrator มีหน้าที่จัดการด้าน Security เป็นระดับ ดังนี้ Oracle User Accounts หรือ Oracle IDs เพื่อให้สิทธิ์ในการเข้าถึง Table ใน Database โดยปกติทำการ Set up โดย Oracle database administrator Application คือกลุ่มของ Functions, Forms, programs, และ reports Functionals เป็นส่วนหนึ่งที่ regist อยู่ภายใต้ application สามารถ assign ให้กับ responsibility ผ่านทาง menu นึงได้ หรือนำออกจาก responsibility ด้วย menu exclusion ตัวอย่าง Function เช่น Oracle Form หรือ HTML page Report ถูกจัดกลุ่มอยู่ใน request groups ซึ่งถูกผูกเข้ากับ responsibility Responsibility คือกลุ่มของสิทธิ์ต่างๆ ที่ยอมให้เข้าถึงได้ Application Ledger Operation Unit Function Security ประกอบด้วย User , Reponsibility and Application ส่วนของ application control ว่าสามารถใช้ Function อะไรได้บ้าง และ สามารถ summit standard report อะไรได้บ้าง
  2. Predefined Responsibilities All Oracle Applications products are installed with predefined responsibilities. Consult the reference guide for your Oracle Applications product for the names of those predefined responsibilities. Additionally, instances of the major components that help define a responsibility (data groups, request security groups, menus, and functions) are predefined for Oracle Applications. Responsibilities and Request Security Groups When a request group is assigned to a responsibility, it becomes a request security group . From a standard submission form, such as the Submit Requests form, users can run only the reports, concurrent programs, and request sets that are in their responsibility's request security group. If you do not include the Submit Requests form on the menu for a responsibility, then you do not need to assign a request security group to the responsibility. If a request security group is not assigned to a responsibility, then users working under that responsibility cannot run any reports, request sets, or other concurrent programs from a standard submission form. Responsibilities and Function Security Oracle Applications GUI-based architecture aggregates several related business functions into a single form. Parts of an application's functionality may be identified as individual Oracle Applications functions, which can then be secured (i.e., included or excluded from a responsibility).
  3. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  4. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  5. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  6. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  7. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  8. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  9. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  10. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  11. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  12. Identify menu needs ดูว่า menu ต้องมีอะไรบ้าง Print function security report for similar existing menus พริ้นฟังก์ชัน Security ออกมาเพื่อดูว่ามีเมนู , ฟังก์ชัน , report อะไรบ้าง
  13. สรุปกราฟ
  14. สร้างแบบง่ายโดยใช้ Wizard เข้ามาช่วย เมื่อเลือกสร้างโดยใช้ Wizard ตอนสร้างจะให้เลือกประเภทการรันได้เพียงแบบใดแบบหนึ่งเท่านั้นคือ จะทำเป็นแบบ Sequentially ( รันเรียงต่อกันไปทีละ State ) หรือ Parallel ( รันควบคู่กันไปได้ถ้าไม่มีข้อมูลที่เชื่อมโยงกัน ) แต่ในส่วนนี้สามารถมาแก้ไขเองทีหลังได้ว่าให้ State ใดรันแบบใหนได้ หน้านี้จะถามว่า ถ้าหากโปรแกรมเกิด Error ระหว่างการทำงาน จะให้ Request set ทำงานอย่างไร มีให้เลือกสองประเภท - Abort Processing ยกเลิกการทำงานทั้งหมดไปเลย – Continue Processing ข้ามในส่วนที่มีปัญหาแล้วทำงานต่อไป เลือก Abort Processing แล้วกด Next เพิ่มรายการ ใน Program ดังนี้ - FSG - Column Set Detail Listing - FSG - Content Set Summary Listing - FSG - Report Set Summary Listing - FSG - Row Order Detail Listing - FSG - Row Set Detail Listing กด Finish
  15. Create Request Groups โดยใส่ข้อมูลดังรูป แล้วไปเลือก Type เป็นแบบ Set ช่อง Name ไปเรียกข้อมูล Create Request Set ที่สร้างไว้แล้วก่อนหน้ามาใช้
  16. การสร้างเมนูจะสร้างจาก level ล่างสุดขึ้นบน
  17. User/ password User name : KHEMANIT Password : group3 User name : boypakorn Password : boypakorn User name : Arerak Password : arerak
  18. User/ password User name : KHEMANIT Password : group3 User name : boypakorn Password : boypakorn User name : Arerak Password : arerak
  19. User/ password User name : KHEMANIT Password : group3 User name : boypakorn Password : boypakorn User name : Arerak Password : arerak