3.1 Role-Based Access Control
Role-based security in Oracle FCCM Customer Screening Cloud Service controls who can do what on which data.
The following table summarizes role-based access.
Table 3-1 Role-based Access
Component | Description |
---|---|
Who | The role assigned to a user. |
What | The functions which users with the role can perform. |
Which Data | The set of data which users with the role can access when performing the function. |
The following table provides examples of role-based access.
Table 3-2 Examples of role-based access.
Who | What | Which Data |
---|---|---|
Data Administrators | Prepare and ingest data | Business data |
Case Analysts | View, analyze, and act on cases | Business data and Operational data |
Note:
The new user should have the following roles to access Home page of the Cloud application.
- Function read role
- Group read role
- User read role
- Role read role