Creating Security Validation Reports in Opkey for Oracle

Opkey's security validation reports are specialized reports that assess and validate the security roles and permissions within your Oracle (or other ERP) environment, after patch updates. These reports compare pre-patch and post-patch security roles excel files to ensure that security roles and access controls remain consistent and compliant. By generating these reports, you can identify any discrepancies or changes in security settings that could lead to unauthorized access or other security issues.

You can also upload your pre and post patch excel files in Zipped folders on Opkey and generate their security role comparison report in Excel format. Let's understand this process.

1. Login to your Opkey account. Click the Report tab on the left panel.

Next, select the Automate Report option.


2. In the Automate report option, click the Generate report button.


3. On the generate report form, add a name for the report and select the report type from the dropdown as Security Validation Report.


4. The report is created as Excel file by dafault. In the upload reports section, upload your pre-patch or source excel file or the zipped file folder containing pre-patch excel files in the Source file section. Next, upload your Post patch files or folders in the Target file section. Once uploaded, click the Generate button at the bottom.


5. The report creation process will continue. Once done the report will be downloaded. 



6. Once done, click on Download Report.



7. You can open the downloaded report form the Downloads section of your browser. The report will be in excel file format and will show your the list of changes in security roles and privileges.



8. The security validation report has three sheets at the bottom. 


The Summary sheet provides overview of functional and data security changes for a role. Unchanged policies are represented by check sign and changed policies are shown by crossed sign.


In the Statistics tab, you can see security policies added, modified, or changed for a role.


In the Detailed comparison tab, we can review details of changes related to functional or data policies for a role.



Now, are familiar with all elements of creating a security validation report. Click here to learn about test result report.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article