Any advice or recommendations expressed in this blog (or sites they link to) is our own experience and are not validated by Oracle

Friday, July 20, 2007

Security Profiles Setup

Once the Business Group is Setup a Default Security Profile will be created with the same name as the Business group with security type as "View All Organization", It is Strongly recommended not do modify the default Security Profile.

Attach this profile option to HR:Security Profile and attach the Business Group to the HR:Business Group at the site level if it is the Base Business Group or attach it to the responsibility if it is the Multi Business Group

In case of the multi Business Group, if we need to enable the Security Group ,
set the Profile option 'Enable Security Groups' to yes at the Application level,


Either we can attach the new security group manually to each responsibility at the time of attaching it to the User or we can able to create the responsibility for each of the Security group defined by running the concurrent program 'Enable Multiple Security Group process'


To Build the Custom Security Profile:

Enter the name of the Security profile and select the Business Group from the LOV. Now three type of security can be assigned



  • 'Secure Organization by Single Operating Unit' or 'Secure by Operating unit and Inventory organization' are for the restricting certain Financial and Manufacturing Business View.Attach this profile option to MO:Security Profile at the responsibility level

  • 'Secure Organization by Organization Hierarchy and or Organization List', this security type is for the restricting the user to access certain Organization based on the hierarchy. Select the Organization hierarchy from the LOV, you can include the top organization in the hierarchy or you can exclude the Business Group. Once the necessary setup is done you can attach this security profile to the Responsibility level in the Profile Option HR:Security Profile.

Note: Once the security is setup we need to run the concurrent program 'Security List Maintenance' and choose the parameters based on the requirement.

Enjoii Implementing :)