Home / Educational Content / HCM Cloud / Requirements to Configuration: A Step by Step Guide to HCM Cloud Security

Requirements to Configuration: A Step by Step Guide to HCM Cloud Security

Recorded at COLLABORATE 19

Session: 100790

Texas Instruments Inc. is a global technology company that designs and manufactures semiconductors and various integrated circuits. With a global workforce of 50k employees and contractors, Texas Instruments is on the HCM Cloud implementation journey with the help of Accenture. This session will showcase the step-by-step approach used to convert TI’s 150+ user security requirements into security configuration in HCM Cloud. The approach will cover: 1. User group identification 2. Defining req. by user group 3. Categorizing each requirement into configuration methods: Duty Role/Privilege, Security Profile/Data Role, Role provisioning rule, Workflow and/or Page Personalization 4. Configure each requirement per config method

Presented by Asim Siddiqui, Accenture, LLP

Watch the full-length video

You’ve reached the ultimate Oracle customer network—exclusively for Quest Corporate and Professional members.

Join Quest to unlock access to strategic content centers, event replays, exclusive programming, and expert insights—all designed to help Oracle users like you go further, faster.

Whether you're on JD Edwards, PeopleSoft, or Oracle Cloud, Quest connects you with a powerful peer network and Oracle experts so you can make smarter decisions, drive innovation, and get more from your investment.

Quest is where Oracle customers connect, learn, and lead with confidence. Ready to join them?

Requirements to Configuration: A Step by Step Guide to HCM Cloud Security