Requirements to Configuration: A Step by Step Guide to HCM Cloud Security
-
Posted by Quest Customer Learning Team
- Last updated 6/08/21
- Share
Recorded at COLLABORATE 19
Session: 100790
Texas Instruments Inc. is a global technology company that designs and manufactures semiconductors and various integrated circuits. With a global workforce of 50k employees and contractors, Texas Instruments is on the HCM Cloud implementation journey with the help of Accenture. This session will showcase the step-by-step approach used to convert TI’s 150+ user security requirements into security configuration in HCM Cloud. The approach will cover: 1. User group identification 2. Defining req. by user group 3. Categorizing each requirement into configuration methods: Duty Role/Privilege, Security Profile/Data Role, Role provisioning rule, Workflow and/or Page Personalization 4. Configure each requirement per config method
Presented by Asim Siddiqui, Accenture, LLP
Watch the full-length video
Premium Content: access is limited to Quest Corporate and Professional members.
Membership has its perks. Get unlimited access to the latest Oracle updates, event session replays, strategic content centers and special members-only programming, plus big discounts on conference registration, with a Quest Corporate or Professional membership. Quest is where you learn.