About User and Role Management
This business process employs several security layers to ensure security. Infrastructure components, which are implemented and managed by Oracle, create a secure environment for the application.
Business process-level security is ensured by using the following mechanisms that permit only authorized users to access the application:
-
Single Sign-on (SSO)
-
Role-based access to the business process
Global roles are granted through the Oracle Cloud Identity Console. See Getting Started with Oracle Enterprise Performance Management Cloud for Administrators.
Access permissions are granted through the application interface and are described in this chapter.
Tutorials
Tutorials provide instructions with sequenced videos and documentation to help you learn a topic.
Your Goal | Learn How |
---|---|
Learn how to manage security in Access Control and set up access permissions in the business process. The Background and Security Overview sections in this tutorial describes the layers of business process security. | Setting Up Security in Planning |