By implementing the Materials Management and Logistics offering, your enterprise can configure business rules that govern materials management and logistics activities for a warehouse.
Before you begin, use the Getting Started page in the Setup and Maintenance work area to access reports for each offering, including full lists of setup tasks, descriptions of the options and features you can select when you configure the offering, and lists of business objects and enterprise applications associated with the offering.
The first implementation step is to configure the offerings in the Setup and Maintenance work area by selecting the offerings and options that you want to make available to implement. For the
Materials Management and Logistics offering, you can select the following options:
• Materials Management and Logistics (this option also has associated
features that you can select to configure)
• Supply Chain and Order Management Business Intelligence Analytics
• Order Management Business Intelligence Analytics
• Logistics Business Intelligence Analytics
• Intrastat Reporting
Next, create one or more implementation projects for the offerings and options that you want to implement first, which generates task lists for each project. The application implementation manager can customize the task list and assign and track each task.
If you select all of the options, the generated task list for this offering contains the following groups of tasks:
• Define Common Applications Configuration for Materials Management
• Define Common SCM Configuration
• Define Warehouse Administration
• Define Transactional Business Intelligence Configuration
• Define Extensions for Materials Management and Logistics
To start an Oracle Fusion Applications implementation, you must setup one or more initial users using the super user that was created during installation and provisioning of the Oracle Fusion Applications environment. Because Oracle Fusion Applications is secure as delivered, the process of enabling the necessary setup access for initial users requires several specialized steps when getting started with an implementation.
The following high level steps are required for starting an implementation.
1. As the Oracle Identity Management Administration user, provision the IT Security Manager job
role with roles for user and role management. This step enables the super user account,
which is provisioned with the IT Security Manager job role, to create implementation users.
2. As the Oracle Fusion Applications installation super user, perform the following tasks once
you have selected an offering to implement and generated the setup tasks needed t
implement the offering.
a. Synchronize users and roles in the Lightweight Directory Access Protocol (LDAP) store with
HCM user management by using the Run User and Roles Synchronization Process task.
b. Create an IT security manager user by using the Create Implementation Users task.
c. Provision the IT security manager with the IT Security Manager role by using the Provision
Roles to Implementation Users task.
3. As the newly created IT security manager user, sign in to Oracle Fusion Applications and set
up at least one implementation user for setting up enterprise structures.
a. Create an implementation user by using the Create Implementation Users task.
b. Provision the implementation user with the Application Implementation Manager job role or the
Application Implementation Consultant job role by using the Provision Roles to Implementation
users task. The Application Implementation Consultant job role inherits from all product-specific
application administrators and entitles the necessary View All access to all secured object.
c. Optionally, create a data role for an implementation user who needs only the limited access of
a product-specific Application Administrator by using the Create Data Role for Implementation
Users. Then assign the resulting data role to the implementation user by using the Provision
Roles to Implementation Users task.
The figure shows the task flow from provisioning the IT Security Manager job role with the user and role management entitlement to creating and provisioning implementation users for enterprise setup.