Risk Administrator (Job Role)
Individual responsible for performing risk administration duties.
Role Hierarchy
The Risk Administrator job role directly and indirectly inherits these roles.
-
Risk Administrator
-
AI Agent Connector Management
-
Access Certification Transaction Analysis
-
Advanced Access Control Transaction Analysis
-
Advanced Controls Administrator
-
Advanced Financial Control Transaction Analysis
-
Algorithm Data Synchronization
-
Financial Reporting Compliance Transaction Analysis
-
Manage Risk Intelligent Agent
-
Perspective Manager
-
Risk Management Administrator
-
Risk Management Folder Reporting
-
Risk Management Security Administrator
-
Risk Management Security Viewer
-
Risk Power User
-
Content Intelligence Users
-
-
Duties
This table lists the duties assigned directly and indirectly to the Risk Administrator job role.
| Duty Role | Description |
|---|---|
|
AI Agent Connector Management |
Provides ability to administer connectors used in AI Agents. |
|
Access Certification Transaction Analysis |
BI duty role to analyze Access Certification transactional information. |
|
Advanced Access Control Transaction Analysis |
BI duty role to analyze Advanced Access Controls transactional information. |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
|
Advanced Financial Control Transaction Analysis |
BI duty role to analyze Advanced Financial Controls transactional information. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
|
Content Intelligence Users |
Provides ability to view content that is generally available to anybody that is logged in. |
|
Financial Reporting Compliance Transaction Analysis |
BI duty role to analyze Financial Reporting Compliance transactional information. |
|
Perspective Manager |
Views, creates, and edits perspective hierarchies. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
|
Risk Management Folder Reporting |
Grants access to the Risk Management web catalog folder. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
|
Risk Management Security Viewer |
Views user assignment groups and business object security for Risk Management. |
Aggregate Privileges
This table lists aggregate privileges assigned directly and indirectly to the Risk Administrator job role.
| Aggregate Privilege | Description |
|---|---|
|
Manage Risk Intelligent Agent |
Allows management and testing of Risk Management intelligent agents, tools and documents. |
Privileges
This table lists privileges granted to duties of the Risk Administrator job role.
| Granted Role | Granted Role Description | Privilege | Privilege Description |
|---|---|---|---|
|
AI Agent Connector Management |
Provides ability to administer connectors used in AI Agents. |
Use AI Agent Connectors |
Access and work with connectors in agent studio |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Cancel Job |
Ability to cancel a job if applicable |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Create and Edit Business Object Security |
Allows user to manage business object security for transaction controls. |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Edit Access Performance Configuration |
Allows for the editing of advanced access configurations for performance. |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Edit Currency Conversion Configuration |
Allows for the editing of advanced transaction configurations for currency conversion. |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Edit Global User Configuration in Application Configurations |
Allows the editing of Global User Configuration |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Edit Schedule |
Allows for the editing of a Schedule |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Manage Additional Advanced Control Data Sources |
Allows for the configuration of additional advanced control data sources. |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Purge Advanced Control Results |
Allows running of Purge Results for Advanced Controls |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Purge Jobs |
Allows for the purging of Jobs |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Rebuild Graph |
Allows for the rebuilding of the Transaction Data Graph |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Run Scheduled Job Now |
Allows for the on demand running of a Scheduled Job |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Run and Schedule Global Users |
Allows for the running and scheduling of Global User Configurations |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Schedule Synchronizations |
Ability to schedule Graph Synchronizations |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
Synchronize Transaction Data Source |
Ability to initiate the Transaction graph synchronization for a data source |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
View Additional Advanced Control Data Sources |
Allows for the viewing of additional advanced control data sources. |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
View Advanced Controls Configuration |
Allows for the viewing of advanced controls configurations for performance. |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
View Global User Configuration in Application Configurations |
Allows viewing of the Global User Configuration |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
View Monitor Jobs |
Allows for the viewing of monitor jobs. |
|
Advanced Controls Administrator |
Defines and manages setup and administration tasks for Advanced Controls. |
View Scheduling |
Allows for the viewing of scheduled jobs. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Get Enterprise Structures Using REST Service |
Allows access to REST services list of values for various XLE, GL, FUN Intercompany setup related business objects that will be consumed cross pillars. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Get General Ledger Setups Using REST Service |
Allows access to REST services list of values for various GL setup related business objects that will be consumed cross pillars. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Get Intercompany Setups Using REST Service |
Allows access to REST services list of values for various FUN Intercompany setup related business objects that will be consumed cross pillars. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Manage Additional Advanced Control Data Sources |
Allows for the configuration of additional advanced control data sources. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Manage Award Service |
Allows access to award service for management of award information such as keywords, funding sources, and budget periods. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Manage Control Budgets |
Allows the management of control budgets set up for budgetary control. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Manage Periodic Average Cost Adjustment |
Allows creation of periodic average cost adjustments. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Manage Project Program |
Allows managing of programs and monitoring of the projects assigned to the program. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Manage Risk Management Data Integration Configurations |
Allows for the setup and management of external data sources. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
Search Procurement Agent by REST Service |
Allows searching for procurement agents using the REST service. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
View Additional Advanced Control Data Sources |
Allows for the viewing of additional advanced control data sources. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
View Fixed Asset Books |
Allows asset book information to be viewed in Oracle Fusion Assets. |
|
Algorithm Data Synchronization |
Performs data synchronization tasks to support algorithms for Risk Management. |
View Inventory Organizations List of Values by Web Service |
Allow viewing inventory organizations list of values by web service. |
|
Perspective Manager |
Views, creates, and edits perspective hierarchies. |
Create Perspectives |
Create perspective hierarchies and items. |
|
Perspective Manager |
Views, creates, and edits perspective hierarchies. |
Delete Perspectives |
Delete a perspective hierarchy no longer used. |
|
Perspective Manager |
Views, creates, and edits perspective hierarchies. |
Edit Perspectives |
Edit perspective hierarchies and items. |
|
Perspective Manager |
Views, creates, and edits perspective hierarchies. |
View Perspectives |
View perspective hierarchies and items. |
|
Risk Administrator |
Individual responsible for performing risk administration duties. |
Administer Risk Upgrade |
Allows user to receive upgrade messages and initiate the upgrade job. |
|
Risk Administrator |
Individual responsible for performing risk administration duties. |
View Risk Management Dashboard |
Allows viewing of the analytic information on the Risk Management dashboard. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Administer Sandbox |
Allows administration of all sandboxes. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Cancel Job |
Ability to cancel a job if applicable |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Create Import Template |
Allows creating an import template for data migration |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Edit Email Alert and Notification Settings |
Allows for editing configurations for email alerts, notifications, and global settings. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Edit Risk Management Configuration Options |
Allows for editing of object configurations for control, risk, and process. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Edit Schedule |
Allows for the editing of a Schedule |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Import Data File |
Allows for the import of a Data Migration file |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Manage Application Descriptive Flexfield |
Allows management of application descriptive flexfields. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Manage Application Flexfield Value Set |
Allows management of value sets to validate the content of a flexfield segment. Value sets provide declarative validation for use in applications flexfield attributes and key segments. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Manage Application Standard Lookup |
Manage sub-type entities stored in the Application Standard Lookup Values entity. Lookup Types are lists of values such as "Days of the Week" or "Yes/No" which can be used to validate columns values. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Manage Lookup Tables |
Manage Lookup Tables |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Manage Perspectives for a Module |
Allows for the creating, editing, and deleting of perspectives for a module. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Personalize Financial UI |
Allows personalization of financial application UI |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Personalize Risk Management UI |
Allows administrator to personalize Risk Management user interfaces |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Purge Jobs |
Allows for the purging of Jobs |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
Run Scheduled Job Now |
Allows for the on demand running of a Scheduled Job |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
View Administration Link |
Privilege to view administration link in UI shell |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
View Assessment Results |
Allows for the viewing of assessment results. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
View Email Alert and Notification Settings |
Allows for viewing configurations for email alerts, notifications, and global settings. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
View Monitor Jobs |
Allows for the viewing of monitor jobs. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
View Perspectives for a Module |
Allows viewing of the Perspectives for a Module |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
View Risk Management Configuration Options |
Allows for viewing of object configurations for control, risk, and process. |
|
Risk Management Administrator |
Defines and manages setup and administration tasks for Risk Management. |
View Scheduling |
Allows for the viewing of scheduled jobs. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Access Requests |
Allows user to submit requests for themselves or on behalf of others. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Administer Access Requests |
Allows user to administer and approve access requests. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Cancel Job |
Ability to cancel a job if applicable |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Create User Assignment Groups and Assign Users |
Allows for the creation of user assignment groups and assignment of users in Risk Management. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Create and Edit Business Object Security |
Allows user to manage business object security for transaction controls. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Create and Manage Risk Snapshot Report |
Allows user to create and manage Risk and Security Snapshot Report. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Edit Schedule |
Allows for the editing of a Schedule |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Edit User Assignment Groups |
Allows for the editing of user assignment groups for Risk Management. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Manage Data Access for Users |
Manage data access for user provisioned roles. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Manage Procurement Agent by REST Service |
Allows management of procurement agents using the REST service. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Mass Edit Security Assignments |
Allows user to mass edit user and group assignments for all objects and records within Risk Management. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Perform Automated Access Removals |
Allows security administrator to perform automated access removals and approve removal requests. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Perform Manual Access Removals |
Allows security administrator to perform manual access removals and approve removal requests. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Review Access Requests |
Allows user to review role requests that have been specifically assigned to them. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
Run Scheduled Job Now |
Allows for the on demand running of a Scheduled Job |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
View Access Removals |
Allows user to view manual and automated removal requests. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
View Access Requests |
Allows user to view all requests submitted. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
View Monitor Jobs |
Allows for the viewing of monitor jobs. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
View Scheduling |
Allows for the viewing of scheduled jobs. |
|
Risk Management Security Administrator |
Performs all IT administrative tasks for Risk Management around security checkup, configuration, algorithms, and internal controls. |
View Security Checkup |
Allows for the viewing of the Risk Management security checkup. |
|
Risk Management Security Viewer |
Views user assignment groups and business object security for Risk Management. |
View Business Object Security |
Allows viewing of business object security for transaction controls. |
|
Risk Management Security Viewer |
Views user assignment groups and business object security for Risk Management. |
View Monitor Jobs |
Allows for the viewing of monitor jobs. |
|
Risk Management Security Viewer |
Views user assignment groups and business object security for Risk Management. |
View User Assignment Groups |
Allows viewing of user assignment groups for Risk Management. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Access Requests |
Allows user to submit requests for themselves or on behalf of others. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Cancel Job |
Ability to cancel a job if applicable |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create Access Control and Assign Result and Control Users |
Allows for the creation of access controls and assignment of users. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create Access Entitlement |
Allows creating an Access Entitlement |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create Algorithm Filters |
Allows for the creation of algorithm filters. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create Algorithms |
Allows for the creation of access, transaction, and change tracking algorithms. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create Internal Control |
Allows for the creation of an internal control. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create Internal Control Certification Campaign |
Allows for the creation of an internal control certification campaign. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create Internal Control Record Configuration |
Allows for the creation of an internal control record configuration template. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create Risk Reference Data |
Allows for the creation of risk reference data. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create Transaction Control and Assign Result and Control Users |
Allows for the creation of transaction controls and assignment of users. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create User Assignment Groups and Assign Users |
Allows for the creation of user assignment groups and assignment of users in Risk Management. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Create User-Defined Access Points |
Allows creating and copying a User-Defined Access Point |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Access Controls |
Allows for the editing of access controls. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Access Entitlements |
Ability to edit an Access Entitlement |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Access Incident Results |
Allows for the editing of access incident results. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Access Points on Entitlement |
Allows for the editing Access Points in an Entitlement |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Algorithm Filters |
Allows for the editing of algorithm filters. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Algorithm Tasks |
Allows for the editing of access, transaction, and change tracking algorithm task results. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Algorithms |
Allows for the editing of access, transaction, and change tracking algorithms. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Internal Control Certification Campaigns |
Allows for the editing of internal control certification campaigns. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Internal Control Certification Tasks |
Allows for the editing of internal control certification tasks. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Internal Control Record Configurations |
Allows for the editing of internal control record configuration templates. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Internal Controls |
Allows for the editing of internal controls. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Risk Reference Data |
Allows for the editing of risk reference data. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Risk Reference Data Default Process Owner |
Allows for the editing of risk reference data for default process owner which affects all records related to respective process. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Schedule |
Allows for the editing of a Schedule |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Transaction Controls |
Allows for the editing of transaction controls. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit Transaction Incident Results |
Allows for the editing of transaction incident results. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit User Assignment Groups |
Allows for the editing of user assignment groups for Risk Management. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Edit User-Defined Access Points |
Allows editing a User-Defined Access Point |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Export Access Point Data |
Allows user to export access points and role assignment data. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Export Advanced Controls |
Allows for the export of Advanced Controls |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Import Access Point Data |
Allows user to import access points and role assignment data. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Manage Additional Advanced Control Data Sources |
Allows for the configuration of additional advanced control data sources. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Purge Jobs |
Allows for the purging of Jobs |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Review Access Requests |
Allows user to review role requests that have been specifically assigned to them. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Run Advanced Control Analysis |
Allows for the running of Advanced Controls |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Run Scheduled Job Now |
Allows for the on demand running of a Scheduled Job |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
Schedule Advanced Control Analysis |
Ability to schedule Advanced Control analysis |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Access Controls |
Allows for the viewing of access controls. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Access Entitlements |
Allows for the viewing of access entitlements. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Access Incident Results |
Allows for the viewing of access incident results. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Access Requests |
Allows user to view all requests submitted. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Additional Advanced Control Data Sources |
Allows for the viewing of additional advanced control data sources. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Algorithm Filters |
Allows for the viewing of algorithm filters. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Algorithm Tasks |
Allows for the viewing of access, transaction, and change tracking algorithm task results. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Algorithms |
Allows for the viewing of access, transaction, and change tracking algorithms. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Internal Control Certification Campaigns |
Allows for the viewing of internal control certification campaigns. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Internal Control Record Configurations |
Allows for the viewing of internal control record configuration templates. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Internal Controls |
Allows for the viewing of internal controls. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Monitor Jobs |
Allows for the viewing of monitor jobs. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Risk Reference Data |
Allows for the viewing of risk reference data. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Scheduling |
Allows for the viewing of scheduled jobs. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Transaction Controls |
Allows for the viewing of transaction controls. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View Transaction Incident Results |
Allows for the viewing of transaction incident results. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View User Assignment Groups |
Allows viewing of user assignment groups for Risk Management. |
|
Risk Power User |
Allows an assigned user the ability to interact with risk management records, based on the respective record level assignments performed within the application, such as create, assign, view, edit, complete, review, and approve. |
View User-Defined Access Point Details |
Allows viewing of the User-Defined Access Point details |
Data Security Policies
This table lists data security policies and their enforcement across analytics application for the Risk Administrator job role.
| Business Object | Policy Description | Policy Store Implementation |
|---|---|---|
|
AI Agent |
A Risk Administrator can manage ai agent for risk ai agents |
Role: Manage Risk Intelligent Agent Privilege: Manage AI Agent (Data) Resource: AI Agent |
|
AI Agent |
A Risk Administrator can view ai agent for risk ai agents |
Role: Manage Risk Intelligent Agent Privilege: View AI Agent (Data) Resource: AI Agent |
|
AI Agent Business Object |
A Risk Administrator can view ai agent business object for risk ai agent business objects |
Role: Manage Risk Intelligent Agent Privilege: View AI Agent Business Object (Data) Resource: AI Agent Business Object |
|
AI Agent Deep Link |
A Risk Administrator can view ai agent deep link for risk ai agent deep links |
Role: Manage Risk Intelligent Agent Privilege: View AI Agent Deep Link (Data) Resource: AI Agent Deep Link |
|
AI Agent Tool |
A Risk Administrator can manage ai agent tool for risk ai agent tools |
Role: Manage Risk Intelligent Agent Privilege: Manage AI Agent Tool (Data) Resource: AI Agent Tool |
|
AI Agent Tool |
A Risk Administrator can view ai agent tool for risk ai agent tools |
Role: Manage Risk Intelligent Agent Privilege: View AI Agent Tool (Data) Resource: AI Agent Tool |
|
AI Agent Topic |
A Risk Administrator can manage ai agent topic for risk ai agent topics |
Role: Manage Risk Intelligent Agent Privilege: Manage AI Agent Topic (Data) Resource: AI Agent Topic |
|
AI Agent Topic |
A Risk Administrator can view ai agent topic for risk ai agent topics |
Role: Manage Risk Intelligent Agent Privilege: View AI Agent Topic (Data) Resource: AI Agent Topic |
|
AI Agent Workflow |
A Risk Administrator can manage ai agent workflow for risk ai agent workflows |
Role: Manage Risk Intelligent Agent Privilege: Manage AI Agent Workflow (Data) Resource: AI Agent Workflow |
|
AI Agent Workflow |
A Risk Administrator can view ai agent workflow for risk ai agent workflows |
Role: Manage Risk Intelligent Agent Privilege: View AI Agent Workflow (Data) Resource: AI Agent Workflow |
|
Knowledge Content Types |
A Risk Administrator can delete article of a content type connector definition articles |
Role: AI Agent Connector Management Privilege: Delete Article of a content type Resource: Knowledge Content Types |
|
Knowledge Content Types |
A Risk Administrator can delete article of a content type connector instance articles |
Role: AI Agent Connector Management Privilege: Delete Article of a content type Resource: Knowledge Content Types |
|
Knowledge Content Types |
A Risk Administrator can publish article of a content type connector definition articles |
Role: AI Agent Connector Management Privilege: Publish Article of a content type Resource: Knowledge Content Types |
|
Knowledge Content Types |
A Risk Administrator can publish article of a content type connector instance articles |
Role: AI Agent Connector Management Privilege: Publish Article of a content type Resource: Knowledge Content Types |
|
Knowledge Content Types |
A Risk Administrator can update article of a content type connector definition articles |
Role: AI Agent Connector Management Privilege: Update Article of a content type Resource: Knowledge Content Types |
|
Knowledge Content Types |
A Risk Administrator can update article of a content type connector instance articles |
Role: AI Agent Connector Management Privilege: Update Article of a content type Resource: Knowledge Content Types |
|
Knowledge Content Types |
A Risk Administrator can view article of a content type connector definition articles |
Role: AI Agent Connector Management Privilege: View Article of a content type Resource: Knowledge Content Types |
|
Knowledge Content Types |
A Risk Administrator can view article of a content type connector instance articles |
Role: AI Agent Connector Management Privilege: View Article of a content type Resource: Knowledge Content Types |
|
Knowledge Departments |
A Risk Administrator can access content with department the system department |
Role: AI Agent Connector Management Privilege: Access Content with Department Resource: Knowledge Departments |
|
Knowledge User groups |
A Risk Administrator can access content with user group access to content intelligence user group |
Role: AI Agent Connector Management Privilege: Access Content with User Group Resource: Knowledge User groups |
|
Knowledge User groups |
A Risk Administrator can access content with user group access to fusion user user group |
Role: AI Agent Connector Management Privilege: Access Content with User Group Resource: Knowledge User groups |
|
Knowledge User groups |
A Risk Administrator can access content with user group access to fusion user user group |
Role: Content Intelligence Users Privilege: Access Content with User Group Resource: Knowledge User groups |