Home / Educational Content / Oracle Cloud Applications / Requirements to Configuration: A Step by Step Guide to HCM Cloud Security

Requirements to Configuration: A Step by Step Guide to HCM Cloud Security

Recorded at COLLABORATE 19

Session: 100790

Texas Instruments Inc. is a global technology company that designs and manufactures semiconductors and various integrated circuits. With a global workforce of 50k employees and contractors, Texas Instruments is on the HCM Cloud implementation journey with the help of Accenture. This session will showcase the step-by-step approach used to convert TI’s 150+ user security requirements into security configuration in HCM Cloud. The approach will cover: 1. User group identification 2. Defining req. by user group 3. Categorizing each requirement into configuration methods: Duty Role/Privilege, Security Profile/Data Role, Role provisioning rule, Workflow and/or Page Personalization 4. Configure each requirement per config method

Presented by Asim Siddiqui, Accenture, LLP

Watch the full-length video

Access our complete catalog of webinars, blogs and customer stories. Leverage insight from across the community through our library of 4,000+ educational resources.

Requirements to Configuration: A Step by Step Guide to HCM Cloud Security