Security : Creating Roles
Creating Roles on the Security Console
Ways to Create Jobs and Abstract Roles:
The recommended method for creating roles is to use the Security Console to copy a predefined role and then modify the copy.
If a predefined role is not suitable or if you need a role with fewer privileges, you can create a new role from scratch using the Security Console.
?
Role Copying or Editing
Before You Copy a Role:
This will help you identify the components you want to reference, copy, or remove when creating your custom role.
Before copying a job or abstract role, make sure to remove any security profiles directly assigned to the role. You can do this by using the Revoke Security Profiles option on the Data Roles and Security Profiles page. Failing to remove these security profiles may grant users access to more data than intended.
Some roles inherit Transaction Analysis Duty roles, which are used in Oracle Transactional Business Intelligence report permissions. If you copy such a role, avoid copying the Transaction Analysis Duty roles. Instead, add the predefined Transaction Analysis Duty roles to your new custom role. If you copy them, you'll need to update permissions on the relevant reports to secure them using your new role copy.
To copy a role, go to the Security Console and search for and select the role that you want to copy. Then, open the actions list and select Copy Role.
When you select the Copy Role action, the Copy Options dialog box opens with two options: Copy top role and Copy top role and inherited roles
If you're copying a role, select one of two options in a Copy Option dialog:
When you copy a top role, you only copy the selected role. The source role has links to other roles in its hierarchy, and the copy inherits links to the original versions of those roles. If you choose this option, any subsequent changes to the inherited roles will affect both the source top role and your copy.
This method is known as a shallow copy.
Note: A shallow copy is the recommended method for creating custom roles.
?
When you copy a top role and its inherited roles, you copy not only the selected role but also all the roles in its hierarchy. The copied top role will be linked to the new copies of the subordinate roles. By selecting this option, you isolate the copied role from any changes made to the original versions of the inherited roles.?
This option is referred to as a deep copy.
?
Next, an editing train opens. Essentially, you follow the same process in editing a role as you would follow to create one. However, note the following:
On the Copy Role: Basic Information page you see the following details:
Click Submit and Close to finish the copying.
Monitor the copy process on the Administration tab.
Important: Do not attempt to edit the role until after you have created the copy.
Editing Copied Roles
To edit the role, search for the role on the Security Console and select the Edit Role action.
In the Basic Information page, a?Predefined role?box is checked if you selected the Edit Role option for a role shipped by Oracle. In that case, you can:
You can't:
The?Predefined role?check box is cleared if you're editing a custom role or if you have copied a role. In that case, you can make any changes to role components.
To monitor the status of a role-copy job, select the Administration tab, and then the Role Status tab of the Administration page.
Create a Role from Scratch.
To create a role from scratch, select the Roles tab in the Security Console, then click the Create Role button. Enter values in a series of role-creation pages, selecting Next or Back to navigate among them.
On a Basic Information page:
领英推荐
If you select a duty-role category, you can't assign the role you're creating directly to users. To assign it, you would include it in the hierarchy of a job or abstract role, then assign that role to users.
Note:?You can't change the role category for existing roles.
4.???? Optionally, describe the role in the Description field.
?A Function Security policy selects a set of functional privileges, each of which permits use of a field or other user-interface feature. On a Function Security Policies page, you may define a policy for:
As you define a policy, you can either add an individual privilege or copy all the privileges that belong to an existing role:
Select Add Function Security Policy.
Search with Privilege and click on Add Privilege to Role
The Function Security Policies page lists all selected privileges. When appropriate, it also lists the role from which a privilege is inherited. You can:
A Data Security Policy may be explicit or implicit.
You can use a Data Security Policies page to manage implicit policies.
To create a data security ?policy, click the Create Data Security Policy button
Then enter values that define the policy. A start date is required; a name, an end date, and a description are optional
?Values that define the data access include:
o Select by key. Choose a primary key value, to limit the data set to a record in the data resource whose primary key matches the value you select.
o?Select by instance set. Choose a condition that defines a subset of the data in the data resource. Conditions vary by resource.
o?All values: Include all data from the data resource in your data set.
?The Data Security Polices page lists all policies defined for the role. You can edit or delete a policy: click the Actions button, and select the Edit or Remove option.
A Role Hierarchy page displays either a visualization graph, with the role you're creating as its focus, or a visualization table. Select the Show Graph button or View as Table button to select between them. In either case, link the role you're creating to other roles from which it's to inherit function and data security privileges.
To add a role:
1.?Select Add Role.
2.?In a Search field, select a combination of role types and enter at least three characters. The search returns values including items of the type you selected, whose names contain the characters you entered.
3.?Select the role you want, and click Add Role Membership. You add not only the role you have selected, but also its entire hierarchy.
In the graph view, you can use the visualization Control Panel, Legend, and Overview tools to manipulate the nodes that define your role hierarchy.
?
On a Users page, you can select users to whom you want to assign a job or abstract role you're creating. (You can't assign a duty role directly to users.)
To add a user:
2. In a Search field, select the value Users or types of role in any combination and enter at least three characters. The search returns values including items of the type you selected, whose names contain the characters you entered.
3.?Select a user or role. If you select a user, click Add User to Role. If you select a role, click Add Selected Users; this adds all its assigned users to the role you're creating.
The Users page lists all selected users. You can delete a user. You may, for example, have added all the users associated with a role. If you want to assign your new role only to some of them, you must delete the rest. To delete a user, click its x icon.
On a Summary and Impact Report page, review the selections you have made. Summary listings show the numbers of function security policies, data security policies, roles, and users you have added and removed. An Impact listing shows the number of roles and users affected by your changes. Expand any of these listings to see names of policies, roles, or users included in its counts.
If you determine you must make changes, navigate back to the appropriate page and do so. If you're satisfied with the role, select Save and Close.
Oracle Cloud ERP Consultant
3 周Sometimes it is necessary to complete the information using the Manage Data Roles and Security Profiles task.