GRC and Audit Topics

Blog Series: RBAC – What is it? Should you implement it?

Submitted by Cam Larner on Sunday, 02/13/2019 - 12:41 pm 0 comment

by Cameron LarnerPresidentAbsolute Technologies, Inc. Ever since the passage of Sarbanes-Oxley legislation, auditor scrutiny of ERP system user access controls at publicly traded enterprises has been evolving, as has corporate compliance.  Though adoption has been slow, by now most public companies have either manual

Read More

Role Based Access Controls in R12 – Pros & Cons

Submitted by Cam Larner on Sunday, 10/25/2018 - 6:37 pm 0 comment

Thinking of deploying User Management’s RBAC (Role Based Access Controls) in your EBS R12 instance? RBAC, in principle, has been touted as a best practice for efficiently achieving SoD compliance in systems prone to access risk. Advocates assert that once configured, it requires less effort to maintain and provision

Read More

Certify Responsibility Assignments – Automate User Access Controls

Submitted by Cam Larner on Sunday, 03/15/2018 - 4:16 pm 2 comments

Many Oracle E-Business Suite customers periodically audit who has access to what EBS Responsibilities…manually! To automate user access controls in Oracle EBS, Absolute Technologies added Certify Responsibility Assignments™ (CRA) to its suite of GRC products. CRA empowers internal auditors and assignment approvers

Read More

OAUG Collaborate 18

Submitted by Cam Larner on Sunday, 03/15/2018 - 3:38 pm 0 comment

Absolute will be exhibiting at Booth 1344 during the OAUG Collaborate 18 conference from April 22-26, 2018 in Las Vegas at the Mandalay Bay Resort and Casino. Drop by to discuss how our suite of GRC solutions can automate your User Access Controls in E-Business Suite, from policy to certification, to achieve 100%

Read More

Resolving Java Security Issues in Oracle E-Business Suite

Submitted by on Sunday, 07/01/2015 - 2:02 pm 0 comment

A customer recently contacted me regarding issues connecting to Oracle EBS forms based modules (like SOD Violations Manager), in which new security settings in Java 7+ were preventing him from accessing the application. I advised him that he now needed to register the module’s URL as a trusted site in Java and in the

Read More
MENU