« Return to event
Time: 10:30 AM - 11:15 AM
Track: Track 1
Learn implementation considerations for Role-based access control (RBAC) in Oracle R12. Compare the Oracle EBS Roles model with the new Fusion security model. Roles provide significant security design improvement over the Responsibilities based option by normalizing access to functions and data through user roles rather than only users. We will provide examples of implementing RBAC security model that improve access security by controlling what a user can do on each function or sets of data under specific condition, e.g. view and edit are actions, and task flows or rows in data tables are resources.
Published: 02.07.2015 - This document is restricted to members