About User and Role Management

This business process employs several security layers to ensure security. Infrastructure components, which are implemented and managed by Oracle, create a secure environment for the application.

Business process-level security is ensured by using the following mechanisms that permit only authorized users to access the application:

  • Single Sign-on (SSO)

  • Role-based access to the business process

Global roles are granted through the Oracle Cloud Identity Console. See Getting Started with Oracle Enterprise Performance Management Cloud for Administrators.

Access permissions are granted through the application interface and are described in this chapter.

Tutorials

Tutorials provide instructions with sequenced videos and documentation to help you learn a topic.

Your Goal Learn How
Learn how to manage security in Access Control and set up access permissions in the business process. The Background and Security Overview sections in this tutorial describes the layers of business process security. tutorial icon Setting Up Security in Planning