Você está na página 1de 8

11i HRMS System

Administration
Student Guide

14590GC31
Edition 3.1
March 2005
D41393

Copyright Oracle Corporation, 2005. All rights reserved.


This documentation contains proprietary information of Oracle Corporation. It is provided under a license agreement containing
restrictions on use and disclosure and is also protected by copyright law. Reverse engineering of the software is prohibited. If this
documentation is delivered to a U.S. Government Agency of the Department of Defense, then it is delivered with Restricted Rights
and the following legend is applicable:
Restricted Rights Legend
Use, duplication or disclosure by the Government is subject to restrictions for commercial computer software and shall be deemed
to be Restricted Rights software under Federal law, as set forth in subparagraph (c)(1)(ii) of DFARS 252.227-7013, Rights in
Technical Data and Computer Software (October 1988).
This material or any portion of it may not be copied in any form or by any means without the express prior written permission of the
Education Products group of Oracle Corporation. Any other copying is a violation of copyright law and may result in civil and/or
criminal penalties.
If this documentation is delivered to a U.S. Government Agency not within the Department of Defense, then it is delivered with
Restricted Rights, as defined in FAR 52.227-14, Rights in Data-General, including Alternate III (June 1987).
The information in this document is subject to change without notice. If you find any problems in the documentation, please report
them in writing to Worldwide Education Services, Oracle Corporation, 500 Oracle Parkway, Box SB-6, Redwood Shores, CA 94065.
Oracle Corporation does not warrant that this document is error-free.
Oracle and all references to Oracle Products are trademarks or registered trademarks of Oracle Corporation.
All other products or company names are used for identification purposes only, and may be trademarks of their respective owners.

Author
Kathryn ODonoghue
Technical Contributors and Reviewers
Samir Buche, John Cafolla, Adrian Hunter
This book was published using:

oracletutor

Table of Contents
11i HRMS System Administration.................................................................................................................1-1
11i HRMS System Administration ................................................................................................................1-2
Course Objectives..........................................................................................................................................1-3
Overview .......................................................................................................................................................1-4
What Is System Administration? ...................................................................................................................1-5
DBA And System Administrator Tasks.........................................................................................................1-6
System Administration Tasks ........................................................................................................................1-7
System Administration Tasks - Detail ...........................................................................................................1-8
System Administration Responsibilities........................................................................................................1-9
Common System Administration Windows ..................................................................................................1-10
System Administration - New Developments................................................................................................1-11
Workbench with Functions and Tabs ............................................................................................................1-13
Additional Material........................................................................................................................................1-14
Introduction .....................................................................................................................................................2-1
Introduction ...................................................................................................................................................2-2
Objectives ......................................................................................................................................................2-3
Introduction to Security in Oracle HRMS ....................................................................................................3-1
Introduction to Security in Oracle HRMS .....................................................................................................3-2
Security in Oracle HRMS - Key Questions ...................................................................................................3-3
Roles..............................................................................................................................................................3-4
Users and Responsibilities.............................................................................................................................3-5
Designing New Responsibilities....................................................................................................................3-6
Defining User Access to People ....................................................................................................................3-7
Example: Supervisor Hierarchy.....................................................................................................................3-8
Defining User Access to Functions ...............................................................................................................3-9
Interaction of Security Elements ...................................................................................................................3-10
Practice - Creating Users ...........................................................................................................................3-11
Solution - Creating Users...........................................................................................................................3-12
Two Types of Security ..................................................................................................................................3-13
Other Security Tasks .....................................................................................................................................3-14
Auditing.........................................................................................................................................................3-15
Introduction to Extending Oracle HRMS .....................................................................................................4-1
Introduction to Extending Oracle HRMS ......................................................................................................4-2
Configuring Oracle HRMS - Why? ...............................................................................................................4-3
Configuring and Extending............................................................................................................................4-4
Extending Oracle Applications......................................................................................................................4-5
Extendable Elements in Oracle HRMS .........................................................................................................4-6
Typical System Administrator Activities ......................................................................................................4-7
Approvals in Oracle HRMS...........................................................................................................................4-8
Workflow.......................................................................................................................................................4-9
Working with the Workflow Builder.............................................................................................................4-10
Flexfields .......................................................................................................................................................4-11
Lookups .........................................................................................................................................................4-12
Base Currency ...............................................................................................................................................4-13
Practice - Enabling Currencies ..................................................................................................................4-14
Solution - Enabling Currencies..................................................................................................................4-15
International HRMS ......................................................................................................................................4-16
Security in Oracle HRMS ...............................................................................................................................5-1
Security in Oracle HRMS..............................................................................................................................5-2
Objectives ......................................................................................................................................................5-3
Copyright Oracle, 2005. All rights reserved.

11i HRMS System Administration Table of Contents


i

Security Design ................................................................................................................................................6-1


Security Design .............................................................................................................................................6-2
What Is Security?...........................................................................................................................................6-3
Security Design - Approach...........................................................................................................................6-4
Standard Security...........................................................................................................................................6-5
Security Groups Enabled Model....................................................................................................................6-6
Security Groups .............................................................................................................................................6-7
Security Models.............................................................................................................................................6-8
Security Design - Role Considerations..........................................................................................................6-9
Role Type - Individual User ..........................................................................................................................6-10
Role Type - Line Manager.............................................................................................................................6-11
Role Type - Professional User.......................................................................................................................6-12
Security Design - Implementation .................................................................................................................6-13
Function Security.............................................................................................................................................7-1
Function Security...........................................................................................................................................7-2
Overview .......................................................................................................................................................7-3
Menus: Alternatives.......................................................................................................................................7-4
Using Standard Menus and Functions ...........................................................................................................7-5
Creating Menus - When and Why?................................................................................................................7-6
Creating Menus for Role Types.....................................................................................................................7-7
Note: Multiple Windows ...............................................................................................................................7-8
Practice - Creating Menus .........................................................................................................................7-9
Solution - Creating Menus.........................................................................................................................7-11
Creating New Versions of Functions.............................................................................................................7-14
Key Concepts: Responsibilities .....................................................................................................................7-15
Responsibilities Window ...............................................................................................................................7-16
Excluding Functions and Menus ...................................................................................................................7-17
Practice - Excluding Menus and Functions ...............................................................................................7-18
Solution - Excluding Menus and Functions...............................................................................................7-20
Request Groups and Request Sets .................................................................................................................7-22
Practice - Defining a Request Set ..............................................................................................................7-23
Solution - Creating a Request Set ..............................................................................................................7-24
Practice - Creating a Request Group..........................................................................................................7-26
Solution - Creating a Request Group .........................................................................................................7-27
Global Design Considerations .......................................................................................................................7-29
Security Profiles - Overview ...........................................................................................................................8-1
Security Profiles - Overview .........................................................................................................................8-2
Security Design - Approach...........................................................................................................................8-3
Security Profiles - How Do They Work?.......................................................................................................8-4
Security Restriction Terminology..................................................................................................................8-5
Creating Security Profiles..............................................................................................................................8-6
Security Profiles Window..............................................................................................................................8-7
Security Profiles and Business Groups..........................................................................................................8-8
Global Security Profiles Window ..................................................................................................................8-10
Creating Security Profiles for Users ..............................................................................................................8-11
Security Profiles for Reporting Users............................................................................................................8-12
Security Profile Processes .............................................................................................................................8-13
Assigning Security Profiles ...........................................................................................................................8-15
Restricting Access to People Using Security Profiles....................................................................................9-1
Restricting Access to People Using Security Profiles ...................................................................................9-2
Security Design - Approach...........................................................................................................................9-3
Defining the Scope of the Security Profile ....................................................................................................9-4
Types of Security Profile ...............................................................................................................................9-5
Combining Security Rules.............................................................................................................................9-6
Assignment-Based Security Profile ...............................................................................................................9-7
Copyright Oracle, 2005. All rights reserved.

11i HRMS System Administration Table of Contents


ii

Practice - Creating a Supervisor Security Profile ......................................................................................9-8


Solution - Creating a Supervisor Security Profile......................................................................................9-10
Practice - Creating a Security Profile Based on Organization Hierarchy ..................................................9-13
Solution - Creating a Security Profile Based on Organization Hierarchy..................................................9-15
Supervisor Information..................................................................................................................................9-18
Practice - Supervisor Information..............................................................................................................9-19
Solution - Supervisor Information .............................................................................................................9-21
Practice - Supervisor Hierarchies in SSHR ...............................................................................................9-23
Solution - Supervisor Hierarchies in SSHR...............................................................................................9-24
Security Profiles Window..............................................................................................................................9-26
Practice - Creating an Assignment-Based Profile......................................................................................9-27
Solution - Creating an Assignment-Based Profile .....................................................................................9-28
Securing Forms by Individual Assignment ...................................................................................................9-30
Practice - Individual Assignment Security ................................................................................................9-31
Solution - Individual Assignment Security................................................................................................9-32
Custom Security ............................................................................................................................................9-35
Dynamic and Static Security Lists.................................................................................................................9-36
Multiple Assignments in SSHR.....................................................................................................................9-37
Design Considerations - Assignment Level Security ....................................................................................9-38
User Profiles .....................................................................................................................................................10-1
User Profiles ..................................................................................................................................................10-2
User Profiles - Characteristics .......................................................................................................................10-3
Security Design - Approach...........................................................................................................................10-4
System and User Profile Options...................................................................................................................10-5
HRMS System Profiles..................................................................................................................................10-6
HR:Security Profile/HR:Business Group ......................................................................................................10-7
Enable Security Groups .................................................................................................................................10-9
HR:Query Only Mode/HR:User Type...........................................................................................................10-10
HR:Cross Business Group .............................................................................................................................10-11
Interaction of User Profiles in SSHR.............................................................................................................10-13
DateTrack Profile Options.............................................................................................................................10-14
Other Profile Options.....................................................................................................................................10-16
User Profile Option Values Report................................................................................................................10-17
User Profiles as Settings ................................................................................................................................10-18
Practice - Setting Profile Options ..............................................................................................................10-19
Solution - Setting Profile Options..............................................................................................................10-20
Practice - Defining a Query-only Responsibility.......................................................................................10-21
Solution - Defining a Query-only Responsibility ......................................................................................10-22
Advanced Security Configuration..................................................................................................................11-1
Advanced Security Configuration .................................................................................................................11-2
Objectives ......................................................................................................................................................11-3
Advanced Security Configuration .................................................................................................................11-4
Configuring Functions and Forms .................................................................................................................12-1
Configuring Functions and Forms .................................................................................................................12-2
Functions - Reminder ....................................................................................................................................12-3
Form Functions Window ...............................................................................................................................12-4
Parameters for HRMS Functions...................................................................................................................12-5
Practice - Configuring Functions with Parameters ....................................................................................12-6
Solution - Configuring Functions with Parameters....................................................................................12-7
CustomForm ..................................................................................................................................................12-9
Example of CustomForm...............................................................................................................................12-10
Restricting Data by Criteria ...........................................................................................................................12-11
Include and Exclude Restrictions ..................................................................................................................12-12
Restricting Data in a Window........................................................................................................................12-13
User-Defined Restriction ...............................................................................................................................12-14
Copyright Oracle, 2005. All rights reserved.

11i HRMS System Administration Table of Contents


iii

Practice - Using CustomForm....................................................................................................................12-15


Solution - Using CustomForm...................................................................................................................12-16
Task Flows........................................................................................................................................................13-1
Task Flows.....................................................................................................................................................13-2
Task Flows - Overview..................................................................................................................................13-3
Context-Sensitive Windows ..........................................................................................................................13-4
Creating Task Flows......................................................................................................................................13-5
Task Flows Using Forms Interface................................................................................................................13-6
Define Task Flows Window ..........................................................................................................................13-7
Task Flow Responsibilities............................................................................................................................13-8
Task Flows Using Workflow Designer .........................................................................................................13-9
Workflow Converts to Task Flow .................................................................................................................13-10
Task Flow Restrictions ..................................................................................................................................13-11
Transferring Task Flows Between Databases................................................................................................13-12
Task Flows - Design Decisions .....................................................................................................................13-13
Practice - Defining a Task Flow Node.......................................................................................................13-14
Solution - Defining a Task Flow Node ......................................................................................................13-15
Practice - Defining a Task Flow ................................................................................................................13-16
Solution - Defining a Task Flow................................................................................................................13-17
Practice - Defining Function for Task Flow ..............................................................................................13-19
Solution - Defining a Function for Task Flow...........................................................................................13-20
People Management Configurator .................................................................................................................14-1
People Management Configurator .................................................................................................................14-2
People Management Configurator - Overview ..............................................................................................14-3
Functional Control: For Individual Users or Roles........................................................................................14-4
Visual Control ...............................................................................................................................................14-5
Tailored User Interfaces ................................................................................................................................14-6
Extensibility...................................................................................................................................................14-7
People Management Configurator User Interface .........................................................................................14-8
Using the People Management Configurator: Options ..................................................................................14-9
Delivered Templates......................................................................................................................................14-10
Interaction of Configuration Tools ................................................................................................................14-11
People Management Configurator or CustomForm.......................................................................................14-12
Configuring a People Management Template - Decisions ............................................................................14-13
Maintenance Windows ..................................................................................................................................14-14
SIT and EIT Folders ......................................................................................................................................14-15
Context-Sensitive Fields................................................................................................................................14-16
Notification Messages ...................................................................................................................................14-17
Adding a People Management Template to a Menu or Task Flow................................................................14-18
Formulas for Templates.................................................................................................................................14-20
Practice - Configuring a People Management Template ...........................................................................14-21
Solution - Configuring a People Management Template...........................................................................14-23
Extending Oracle Applications.......................................................................................................................15-1
Extending Oracle Applications......................................................................................................................15-2
Overview .......................................................................................................................................................15-3
User Tables.......................................................................................................................................................16-1
User Tables....................................................................................................................................................16-2
Overview .......................................................................................................................................................16-3
Table Windows..............................................................................................................................................16-4
Table Structures Window ..............................................................................................................................16-5
Table Values Window ...................................................................................................................................16-6
Customizing Table Values Window ..............................................................................................................16-7
Accessing Table Values.................................................................................................................................16-8
Delivered User Tables ...................................................................................................................................16-9
Practice - Creating User Tables .................................................................................................................16-10
Copyright Oracle, 2005. All rights reserved.

11i HRMS System Administration Table of Contents


iv

Solution - Creating User Tables.................................................................................................................16-11


Practice - Entering Table Values ...............................................................................................................16-12
Solution - Entering Table Values...............................................................................................................16-13
Flexfields in Oracle HRMS .............................................................................................................................17-1
Flexfields in Oracle HRMS ...........................................................................................................................17-2
Overview .......................................................................................................................................................17-3
Flexfields .......................................................................................................................................................17-4
Key and Descriptive Flexfields .....................................................................................................................17-5
Creating Flexfields and Segments .................................................................................................................17-6
Developer Flexfields......................................................................................................................................17-7
Extra Information Types (EITs) ....................................................................................................................17-8
Creating EITs.................................................................................................................................................17-9
Registering EITs ............................................................................................................................................17-10
Practice - Creating EITs.............................................................................................................................17-11
Solution - Creating EITs............................................................................................................................17-12
EITs and Security ..........................................................................................................................................17-15
Practice - Information Type Security Window ..........................................................................................17-16
Solution - Information Type Security Window .........................................................................................17-17
Special Information Types (SITs) .................................................................................................................17-19
SITs and EITs ................................................................................................................................................17-20
Lookups and Alerts .........................................................................................................................................18-1
Lookups and Alerts........................................................................................................................................18-2
Overview .......................................................................................................................................................18-3
Lookups Overview ........................................................................................................................................18-4
Why Use Lookups? .......................................................................................................................................18-5
Lookup Access Levels...................................................................................................................................18-6
Global and Local Lookups.............................................................................................................................18-7
Alerts .............................................................................................................................................................18-8
Alerts and Notifications Overview ................................................................................................................18-9
Alerts - Decisions ..........................................................................................................................................18-10
Predefined HRMS Alerts...............................................................................................................................18-11
Alerts - Triggers.............................................................................................................................................18-12
Conditions......................................................................................................................................................18-13

Copyright Oracle, 2005. All rights reserved.

11i HRMS System Administration Table of Contents


v

Você também pode gostar