Home / Educational Content / HCM Cloud / Requirements to Configuration: A Step by Step Guide to HCM Cloud Security

Requirements to Configuration: A Step by Step Guide to HCM Cloud Security

100790 Presented at COLLABORATE 19

Texas Instruments Inc. is a global technology company that designs and manufactures semiconductors and various integrated circuits. With a global workforce of 50k employees and contractors, Texas Instruments is on the HCM Cloud implementation journey with the help of Accenture. This session will showcase the step-by-step approach used to convert TI’s 150+ user security requirements into security configuration in HCM Cloud. The approach will cover: 1. User group identification 2. Defining req. by user group 3. Categorizing each requirement into configuration methods: Duty Role/Privilege, Security Profile/Data Role, Role provisioning rule, Workflow and/or Page Personalization 4. Configure each requirement per config method

Asim Siddiqui, Accenture, LLP

Requirements to Configuration: A Step by Step Guide to HCM Cloud Security