Role-Based Application Security

In Oracle Applications Cloud, users have roles through which they gain access to functions and data.

Users can have any number of roles. Roles are grouped hierarchically to reflect lines of authority and responsibility. User access to functions and data is determined by roles, arranged in hierarchies and provisioned to that user.

Role-based security in Oracle Applications Cloud controls who can do what on which data.

Component

Description

Who

Role assigned to a user

What

Function that users with that role can perform

Which Data

Set of data that users with the role can access when performing the function

Here's an example. Assume that a user named Lynda Jones has these three roles.

  • Admissions coordinator, by which she can access applicant functions and data.

  • Employee, by which she can access employee functions and data.

  • Part-time continuing education student, by which she can access student functions and data.

When Lynda Jones signs in to Oracle Student Management Cloud, she doesn't have to select a role. All of her roles, and the related access permissions, are active concurrently. The functions and data that she can access are determined by this combination of roles, which means she can access all of the functions and data relating to applicants, employees, and students.