Home / Educational Content / HCM Cloud / Requirements to Configuration: A Step by Step Guide to HCM Cloud Security

Requirements to Configuration: A Step by Step Guide to HCM Cloud Security

Recorded at COLLABORATE 19

Session: 100790

Texas Instruments Inc. is a global technology company that designs and manufactures semiconductors and various integrated circuits. With a global workforce of 50k employees and contractors, Texas Instruments is on the HCM Cloud implementation journey with the help of Accenture. This session will showcase the step-by-step approach used to convert TI’s 150+ user security requirements into security configuration in HCM Cloud. The approach will cover: 1. User group identification 2. Defining req. by user group 3. Categorizing each requirement into configuration methods: Duty Role/Privilege, Security Profile/Data Role, Role provisioning rule, Workflow and/or Page Personalization 4. Configure each requirement per config method

Presented by Asim Siddiqui, Accenture, LLP

Watch the full-length video

Premium Content: access is limited to Quest Corporate and Professional members.

Membership has its perks. Get unlimited access to the latest Oracle updates, event session replays, strategic content centers and special members-only programming, plus big discounts on conference registration, with a Quest Corporate or Professional membership. Quest is where you learn.

Requirements to Configuration: A Step by Step Guide to HCM Cloud Security