All Posts on Security

SQL Query to fetch IP Ranges setup for LBAC

  • Post published:April 29, 2020
  • Post category:Security
  • Post comments:0 Comments
  • Post last modified:June 12, 2020
SQL Query to fetch IP Ranges setup for LBAC
SQL Query to fetch IP Ranges setup for LBAC

Do you want to query the LBAC IP Ranges setup for LBAC using BI Publisher Report? It will be handy for the security administrator to validate and cross check the IP list.

Continue Reading SQL Query to fetch IP Ranges setup for LBAC

Limitations/issues faced with LBAC

  • Post published:April 28, 2020
  • Post category:Security
  • Post comments:0 Comments
  • Post last modified:June 12, 2020
Limitations/issues faced with LBAC
Limitations/issues faced with LBAC

Do you know the limitations/issues faced with LBAC feature? Are you using LBAC and facing these issues too? Check out this article to get your questions clarified.

Continue Reading Limitations/issues faced with LBAC

How to disable Single Sign-on or LBAC option?

  • Post published:April 27, 2020
  • Post category:Security
  • Post comments:0 Comments
  • Post last modified:June 12, 2020
How to disable Single Sign-on or LBAC option?
How to disable Single Sign-on or LBAC option?

Do you know what is LBAC (Location Based Access Control)? Do you know how to turn it off when you run into any issues? Have a look at this article to know more details.

Continue Reading How to disable Single Sign-on or LBAC option?

Using Role Mappings and Auto-provisioning Rules

  • Post published:April 27, 2020
  • Post category:Security
  • Post comments:0 Comments
  • Post last modified:June 12, 2020
Using Role Mappings and Auto-provisioning Rules
Using Role Mappings and Auto-provisioning Rules

Do you know what are Role Mappings, How they are configured and how the auto provisioning process works? have a look at this article to find out.

Continue Reading Using Role Mappings and Auto-provisioning Rules

Making a user read-only using Administrator Profile Values

  • Post published:April 13, 2020
  • Post category:Security
  • Post comments:0 Comments
  • Post last modified:June 12, 2020
Making a user read-only using Administrator Profile Values
Making a user read-only using Administrator Profile Values

There are many scenarios where-in the technical developers would need production access to look into any issues for hcm extract runs/BI reports/some setup issues. Security Administrator would have concerns on providing full access to the developers as there are chances that the developer could do some changes with or without knowledge as mostly the developers will have TECHADMIN or superuser…

Continue Reading Making a user read-only using Administrator Profile Values

Enabling Location Based Access Control (LBAC)

  • Post published:April 13, 2020
  • Post category:Security
  • Post comments:0 Comments
  • Post last modified:June 12, 2020
Enabling Location Based Access Control (LBAC)
Enabling Location Based Access Control (LBAC)

Oracle has recently introduced the Location Based Access Control as known as LBAC in Oracle HCM Cloud from 19D. By default this feature will be disabled. In this article we will look at enabling the LBAC option and the benefits of it. What is LBAC?LBAC means Location Based Access Control and it is used to control the access of the…

Continue Reading Enabling Location Based Access Control (LBAC)