Nội dung text r1-12 essential for implementor-sg.pdf
R12.x Oracle E-Business Suite Essentials for Implemters
Running Reports and Programs .....................................................................................................................2-47 Business Intelligence (BI) Publisher ...............................................................................................................2-49 Integration with Oracle Secure Enterprise Search .........................................................................................2-51 Quiz ................................................................................................................................................................2-53 Summary ........................................................................................................................................................2-57 Introduction to Oracle Applications R12.x .....................................................................................................3-1 Introduction to Oracle Applications R12.x ......................................................................................................3-3 Course Objectives ..........................................................................................................................................3-4 Complete E-Business Suite from Oracle ........................................................................................................3-5 Integrated, Yet Modular ..................................................................................................................................3-6 Benefits of Oracle E-Business Suite ..............................................................................................................3-7 Information-Driven Applications .....................................................................................................................3-8 Major Oracle Application Product Families ....................................................................................................3-9 R12.x E-Business Suite Footprint ..................................................................................................................3-10 Oracle Applications R12.x Architecture ..........................................................................................................3-16 Understanding the Oracle Applications R12.x Architecture ...........................................................................3-17 Business Architecture: Oracle Applications R12.x .........................................................................................3-18 Technical Architecture: Oracle Applications R12.x .........................................................................................3-20 Basic Technical Architecture of Oracle Applications R12.x ...........................................................................3-22 Desktop/Client Tier .........................................................................................................................................3-23 Applications Tier .............................................................................................................................................3-25 Database Tier.................................................................................................................................................3-27 The Network ...................................................................................................................................................3-28 Oracle Applications Technology Layer ...........................................................................................................3-29 E-Business Suite Architecture ........................................................................................................................3-30 E-Business Suite Product Directorie ............................................................................................................3-32 Oracle Applications Manager .........................................................................................................................3-34 Service-Oriented Architecture ........................................................................................................................3-35 Oracle E Business Suite Integrated SOA Gateway ........................................................................................3-36 Quiz ................................................................................................................................................................3-37 Summary ........................................................................................................................................................3-41 Fundamentals of System Administration ......................................................................................................4-1 Fundamentals of System Administration ........................................................................................................4-3 Course Objectives ..........................................................................................................................................4-4 Introduction to Application Security ................................................................................................................4-5 Successive Layers of Access Control ............................................................................................................4-6 Increasing Flexibility and Scalability ...............................................................................................................4-7 Function Security ...........................................................................................................................................4-9 Data Security..................................................................................................................................................4-10 Oracle User Management Layers of Access Control ....................................................................................4-11 Role-Based Access Control (RBAC) ..............................................................................................................4-12 Delegated Administration ...............................................................................................................................4-14 Registration Processes ..................................................................................................................................4-16 Self-Service and Approvals ............................................................................................................................4-18 Function Security ...........................................................................................................................................4-19 Application Security: Overview .......................................................................................................................4-21 Use of Menu and Function Security to Modify Responsibilities .....................................................................4-23 Importance of Responsibilities .......................................................................................................................4-24
Defining a New Responsibility ........................................................................................................................4-25 Defining a New Application User ....................................................................................................................4-27 Function Security ...........................................................................................................................................4-28 Data Security..................................................................................................................................................4-29 Data Security Components: Objects ..............................................................................................................4-32 Grants ............................................................................................................................................................4-33 Permissions and Permission Sets ..................................................................................................................4-34 Set Profile Options .........................................................................................................................................4-35 Profile Hierarchy Types ..................................................................................................................................4-37 Profile Hierarchy Levels: Security ..................................................................................................................4-38 Profile Hierarchy Levels: Organization ...........................................................................................................4-39 Profile Hierarchy Levels: Server .....................................................................................................................4-40 Personal Profile Values ..................................................................................................................................4-41 System Profile Options ...................................................................................................................................4-42 Profile Categories ...........................................................................................................................................4-43 Quiz ................................................................................................................................................................4-44 Summary ........................................................................................................................................................4-49 Fundamentals of Flexfields .............................................................................................................................5-1 Fundamentals of Flexfields ............................................................................................................................5-3 Objectives ......................................................................................................................................................5-4 Agenda ...........................................................................................................................................................5-5 Overview of Flexfields ....................................................................................................................................5-6 Using Flexfields to Configure Applications .....................................................................................................5-7 Benefits of Flexfields ......................................................................................................................................5-8 Key and Descriptive Flexfields .......................................................................................................................5-9 Key Flexfields .................................................................................................................................................5-10 Using Key Flexfields to Build Intelligent Keys ................................................................................................5-11 Key Flexfield: Examples .................................................................................................................................5-12 Descriptive Flexfields .....................................................................................................................................5-13 Descriptive Flexfield: Examples .....................................................................................................................5-14 Key and Descriptive Flexfields: Comparison ..................................................................................................5-15 Components of a Flexfield .............................................................................................................................5-16 Segment Prompts and Value Descriptions .....................................................................................................5-17 General Steps to Implement a Flexfield .........................................................................................................5-18 Creating Value Sets .......................................................................................................................................5-19 Planning a Value Set ......................................................................................................................................5-20 Validating Input Using Value Sets ..................................................................................................................5-21 Value Set Attributes .......................................................................................................................................5-22 Types of Value Sets .......................................................................................................................................5-24 Planning Data Format Validation....................................................................................................................5-26 Defining Value Sets ........................................................................................................................................5-27 Defining the Key Flexfield Structure ...............................................................................................................5-28 Planning a Key Flexfield .................................................................................................................................5-29 Designing the Key Flexfield Layout ................................................................................................................5-30 Key Flexfield Structure ...................................................................................................................................5-31 Storing Code Combinations ...........................................................................................................................5-32 Key Flexfield Qualifiers ..................................................................................................................................5-33 Types of Key Flexfield Qualifiers ....................................................................................................................5-34 Key Flexfield Qualifiers Identify Key Flexfield Segments ..............................................................................5-35