3 User Roles and Privileges
This topic provides information about mapping users, groups, roles, and functions to access the application.
In Oracle Financial Crime and Compliance Management Cloud Service, users have roles through which they gain access to functions and data. Users can have any number of roles.
The following figure shows the User Persona Details:
Note:
User-Group mapping changes from IDCS will take 5 minutes to sync with application. If these changes are made during active user session then it will be reflected on next login.
Role-Based Access Control
Role-based security in Oracle Financial Services Crime and Compliance Management Cloud Service controls who can do what on which data.
Table 3-1 Role-based Access Control
Component | Description |
---|---|
Who | Is a role assigned to a user? |
What | Is a function that users with the role can perform? |
Which Data | Is the set of data that users with the role can access when performing the function? |
Table 3-2 Examples of Role-based Access Control
Who | What | Which Data |
---|---|---|
Data Administrator | Can perform Data Preparation and ingestion | Business Data |
Case Analyst | Can view cases and update cases | Business and Operational Data |
Note:
The new user should have the following roles to access Home page of the Cloud application.
- Function read role
- Group read role
- User read role
- Role read role
About User Access Mapping
In order to allow users to access functions in the application, Administrators must classify users and the functions they are permitted to access. The Functions imply controlling various actionable units in the application via functional access. For example, create a case, add a customer, add an account, etc.
Users are mapped to groups,which must be mapped to specific security attributes, such as Business Domain and Jurisdiction. Groups are mapped to Roles, and Roles are mapped to Functions. Users can perform activities associated with their user group throughout the functional areas of the application.
Security within the Application
Security layers control how users interact with the application.
Table 3-3 Security Layer
Security Layer Type | Controls | Description |
---|---|---|
Roles | Access to Features and Functions | User roles identify which features and functions the user can
access within the application.
For example, Case Analysts can access and take action on cases. |
Business Domains | Access to Case and Business Information | You can restrict access along operational business lines and practices, such as Retail Banking. Users can only see cases that are assigned to at least one of the business domains their user group is mapped to. |
Jurisdictions | Access to Case Information | You can restrict access using geographic locations and legal boundaries. Users can only see cases that belong to the jurisdiction their user group is mapped to. |
User Group and Roles Mapping in Oracle FCCM Cloud Service
The following table provides the User Group, User Role mapping, and activities.
Table 3-4 User Group and Roles Mapping for Investigation Hub
Group | User Role | Functionality |
---|---|---|
Identity Administrator | Identity Administrator |
|
Identity Authorizer | Identity Authorizer | Authorize the Identity and access management operations |
IDCS Administrator | IDCS Administrator |
|
IHUB Administrator Group | IHUB Administrator |
|
IHUB Analyst Group | IHUB Analyst |
|
IHUB Supervisor Group | IHUB Supervisor |
|
Table 3-5 Transaction Monitoring User Groups (TM Group - OFS_TM)
Group | User Role | Functionality |
---|---|---|
Pipeline Administrator Group | Pipeline Administrator |
|
Threshold Administrator Groups | CS Administrator | Load watch list data |
Table 3-6 Scheduler Service User Groups
Group | User Role | Functionality |
---|---|---|
Job Administrator Group | Job Administrator | Manage jobs |
Scheduler Administrator Group | Scheduler Administrator | Manage batches |
Table 3-7 Process Modelling Framework (PMF) User Groups
Group | User Role | Functionality |
---|---|---|
IHUB Administrator Group | Manage Workflow Monitor | Access the Manage Workflow Monitor window.
NOTE: The mapping of this role does not allow view, edit, and add actions. |
IHUB Administrator Group | Workflow Access | Access the Process Modeller menu from the Navigation
Tree.
NOTE: The mapping of this role does not allow view, edit, and add actions. |
IHUB Administrator Group | Workflow Monitor Access | Access the Process Monitor window.
NOTE: The mapping of this role does not allow view, edit, and add actions. |
IHUB Administrator Group | Workflow Read | View the PMF workflow |
IHUB Administrator Group | Workflow Write | Perform view, edit, and add actions in PMF |
Note:
Administrators must be mapped to all the roles described in the preceding table to allow them to perform these operations in PMF.
User Roles in Investigation Hub
Table 3-8 User Roles for Case Analyst and Supervisor
Privileges | Case Supervisor | Case Analyst |
---|---|---|
Access Cases | x | x |
Search for Cases | x | x |
View Case List | x | x |
View Case Summary | x | x |
View Event Details | x | x |
Set Event Decision | x | x |
Generate Dossier | x | x |
View/Expand Graph | x | x |
View Graph History | x | x |
Edit Graph Settings | x | x |
View Alerted transactions | x | x |
Add/View Accounts | x | x |
Add/View Customers | x | x |
Add/View Transactions | x | x |
Add/View External Entities | x | x |
View Related Case | x | x |
View Related Events | x | x |
Set Case Assignee | x | x |
Recommend Close without Regulatory Report | x | |
Recommend Close with Regulatory Report | x | |
Reject Recommendation | x | |
Close a Case as False Positive | x | |
Close a Case as True Positive | x | |
View Evidence (Attachment and Comment list) | x | x |
Add Document | x | x |
View Attachments | x | x |
Add/Edit Narrative | x | x |
View Narrative | x | x |
Add Investigation Comments | x | x |
Generate CRR Reports | x | |
Save Search Criteria of Case List | x | x |
Export Case List in Excel | x | x |
Export Transactions in Excel | x | x |
User Roles in Investigation Hub Administrator
Table 3-9 User Roles in Investigation Hub Administrator
Privileges | Case Admin |
---|---|
Add Case Status | x |
Edit Case Status | x |
Add Case Action | x |
Edit Case Action | x |
Mapping the Action to Status | x |
Mapping the Action to User Role | x |
Configuring Case System Parameters | x |
Add Business Domains | x |
Edit Business Domains | x |
Add Jurisdictions | x |
Edit Jurisdictions | x |
Configuring Security Mappings | x |
Manage Case Template | x |
Create Case Template | x |
Update Case Template | x |
Delete Case Template | x |
Configure Default Graph UI Settings | x |