Thursday, May 16, 2013

Materials Management & Logistics Implementation


By implementing the Materials Management and Logistics offering, your enterprise can configure business rules that govern materials management and logistics activities for a warehouse.

Before you begin, use the Getting Started page in the Setup and Maintenance work area to access reports for each offering, including full lists of setup tasks, descriptions of the options and features you can select when you configure the offering, and lists of business objects and enterprise applications associated with the offering.

The first implementation step is to configure the offerings in the Setup and Maintenance work area by selecting the offerings and options that you want to make available to implement. For the

Materials Management and Logistics offering, you can select the following options:

• Materials Management and Logistics (this option also has associated
 features that you can select to configure)
• Shipping
• Receiving
• Supply Chain and Order Management Business Intelligence Analytics
• Order Management Business Intelligence Analytics
• Logistics Business Intelligence Analytics
• Intrastat Reporting

Next, create one or more implementation projects for the offerings and options that you want to implement first, which generates task lists for each project. The application implementation manager can customize the task list and assign and track each task.
If you select all of the options, the generated task list for this offering contains the following groups of tasks:

• Define Common Applications Configuration for Materials Management

• Define Common SCM Configuration
• Define Warehouse Administration
• Define Transactional Business Intelligence Configuration
• Define Extensions for Materials Management and Logistics

To start an Oracle Fusion Applications implementation, you must setup one or more initial users using the super user that was created during installation and provisioning of the Oracle Fusion Applications environment. Because Oracle Fusion Applications is secure as delivered, the process of enabling the necessary setup access for initial users requires several specialized steps when getting started with an implementation.

The following high level steps are required for starting an implementation.

1. As the Oracle Identity Management Administration user, provision the IT Security Manager job
   role with roles for user and role management. This step enables the super user account,    
   which is provisioned with the IT Security Manager job role, to create implementation users.

2. As the Oracle Fusion Applications installation super user, perform the following tasks once  
   you have selected an offering to implement and generated the setup tasks needed t   
   implement the offering.

a. Synchronize users and roles in the Lightweight Directory Access Protocol (LDAP) store with
   HCM user management by using the Run User and Roles Synchronization Process task.

b. Create an IT security manager user by using the Create Implementation Users task.

c. Provision the IT security manager with the IT Security Manager role by using the Provision  
   Roles to Implementation Users task.

3. As the newly created IT security manager user, sign in to Oracle Fusion Applications and set
  up at least one implementation user for setting up enterprise structures.

a. Create an implementation user by using the Create Implementation Users task.

b. Provision the implementation user with the Application Implementation Manager job role or the
   Application Implementation Consultant job role by using the Provision Roles to Implementation
   users task. The Application Implementation Consultant job role inherits from all product-specific  
   application administrators and entitles the necessary View All access to all secured object.

c. Optionally, create a data role for an implementation user who needs only the limited access of
  a product-specific Application Administrator by using the Create Data Role for Implementation
  Users. Then assign the resulting data role to the implementation user by using the Provision
  Roles to Implementation Users task.

The figure shows the task flow from provisioning the IT Security Manager job role with the user and role management entitlement to creating and provisioning implementation users for enterprise setup.


  1. Hi, I am really happy to found such a helpful and fascinating post that is written in well manner. Thanks for sharing such an informative post.For more details about oracle fusion training in Hyderabad please check our website.

    Oracle Fusion Procurement Training Institute

  2. The article is well-written. It is quite informative and attractive. We are the world's leading email database vendor. We at Pegasi Media Group deal with all types of companies and industries irrespective of their sizes and the type of their businesses. Our customized email database contains the customer's geographical location, their interests and other details. Our Contact Discovery Services successfully finds out the customer information and their product or service requirements, which allows you to know their requirements.Materials Management Director Email List

  3. Well written article. Get rid of the traditional ways of marketing and buy a customized email list from us. One real-time data can change your entire business for good. Parana Impact provides you the Email List that you are exactly looking for.
    We have worked with many organizations of all the sizes. Our main focus is customer satisfaction. Advanced Practice Midwife Users Email List

  4. Thanks and Regards. Oracle Apps R12 Training Videos at affordable cost. please check