November 18, 2022

The policy-based identity governance guidebook

The Policy-based Identity Governance GuidebookDigital technologies are fundamentally reshaping how people work. Ever-changing application and infrastructure architectures require constant evolution to meet the challenges facing companies, government agencies, and educational institutions. To meet the demands of the changing environment, Identity Governance and Administration (IGA) also needs to adapt to making […]
November 25, 2022

Getting access certification right

Getting Access Certification right with governanceAccess Governance is the process of monitoring and controlling who in your organization has access to what, when, and how. Access governance and access management are easily confused. But the scope of access governance extends beyond simply managing access to resources. Access governance defines security […]
December 4, 2022

Why you should customize roles for Oracle ERP

Why you should customize roles in Oracle ERPThe dangers of seeded rolesIn Oracle Cloud ERP, or any other ERP application, you have "seeded roles." Seeded roles are the preconfigured roles delivered with your application, and they are designed to get you up and running. Seeded roles are widely used during […]
December 4, 2022

Examples of custom roles in Oracle ERP Cloud

Example custom roles Oracle ERP cloudOracle ERP Cloud security is based on role-based access controls. The role-based security model, also called RBAC, restricts system access to the users. However, out-of-the-box or seeded roles come with inherent risks. Using out-of-the-box roles has advantages, such as faster time to value. However, from a […]