Requirements to Configuration: A Step by Step Guide to HCM Cloud Security
-
Posted by Quest Customer Learning Team
- Last updated 4/19/19
- Share
Recorded at COLLABORATE 19
Session: 100790
Texas Instruments Inc. is a global technology company that designs and manufactures semiconductors and various integrated circuits. With a global workforce of 50k employees and contractors, Texas Instruments is on the HCM Cloud implementation journey with the help of Accenture. This session will showcase the step-by-step approach used to convert TI’s 150+ user security requirements into security configuration in HCM Cloud. The approach will cover: 1. User group identification 2. Defining req. by user group 3. Categorizing each requirement into configuration methods: Duty Role/Privilege, Security Profile/Data Role, Role provisioning rule, Workflow and/or Page Personalization 4. Configure each requirement per config method
Presented by Asim Siddiqui, Accenture, LLP
Watch the full-length video
Access our complete catalog of webinars, blogs and customer stories. Leverage insight from across the community through our library of 4,000+ educational resources.