OraPedia

Home » Posts tagged 'Security'

Tag Archives: Security

Oracle E-Business Suite Security Best Practices

Oracle E-Business Suite Security Best Practices

This article from  Solution Beacon LLC

The article direct link  Oracle E-Business Suite Security Best Practices

Summary

This article discusses the following 20 Oracle E-Business Suite Security Best Practices:

Follow Oracle’s Best Practices
Do Not Allow Shared Accounts
Do Not Use Generic Passwords
Use New Features Provided By The UMX Module
Treat All Non-Production Instances With The Security As Production
Set Application User Signon Profile Values
Set E-Business Suite Timeout Parameters and Profiles
Properly Set Other Security-Related Profiles
Restrict Network Access – Set Password on Database Listener
Follow the Principle of Least Privilege
Regularly Change System Passwords
Minimize Passwords Contained In OS Files
Secure Default Database Accounts
Be Proactive!
Apply all prior, and plan in advance to apply any new Oracle Security Patches
Limit Access To Forms Allowing SQL Entry
Validate Your Security By Performing Security Assessments
Periodically Expire Applications Users’ Passwords
Restrict Network Access – Limit Direct Access To The Database
Don’t stop now!

How to setup Oracle E-Business Suite Password Security (to be more complex)?

How to setup Password Security?

This article from  Oracle Applications APPSLab

The article direct link  How to setup Password Security?

Summary

This article guide you to know how to secure the oracle e-business suite users passwords using Signon profile options.

Security Profiles in HRMS

Security Profiles in HRMS

This article from  Anil Passi

The article direct link  Security Profiles in HRMS

Summary

In oracle HRMS, most of the data must be secured under data protection act. Your date of birth is one such example. Plus also, it is not nice for a system to make salary information etc visible to everyone [just because they have access to responsibility]
In this article, I will discuss the Standard HRMS security model and at the end of this article, I will explain the alternate Security Model in Oracle HRMS.
The alternate Security Model is required to overcome the limitation of standard[basic]security model design.

Why an ex-employee cannot be seen when a custom security profile is used?

Why an ex-employee cannot be seen when a custom security profile is used?

This article from  Mohammad Fawzy

The article direct link  What Fields in Tables Ap_Invoices_Interface and Ap_Invoice_Lines_Interface Should Be Populated to Import Invoices Matched to Purchasing Order (PO)?

Summary

Goal: What fields in tables ap_invoices_interface and ap_invoice_lines_interface should be populated to import invoices matched to Purchasing order?
Fact: APXIIMPT – Payables Open Interface Import
Fact: Oracle Payables 11.5
Fact: Oracle Payables 11
Fact: Oracle Payables 10.7

Understanding and Using HRMS Security in Oracle HRMS [PDF]

Understanding and Using HRMS Security in Oracle HRMS

This article from  Mohammad Fawzy

The article direct link  Understanding and Using HRMS Security in Oracle HRMS

Summary

The purpose of this paper is to introduce and describe the key components of HRMS Security, to provide a technical analysis to enable a better understanding of the processes involved, and to give pointers as to why HRMS Security might not be working as desired. For a more detailed examination of how to set up Security Rules for your enterprise, please refer to the manual Oracle HRMS Configuring, Reporting and System Administration Guide.
You can download understanding and using hrms security in oracle hrms document from the following link:

Understanding_and_using_hrms_security_in_oracle_hrms.pdf