In Oracle Financial Services Crime and Compliance Management Transaction Filtering Cloud Service, users have roles through which they gain access to functions and data. Users can have any number of roles.
The following figure shows the User Persona Details:

NOTE:
· User-Group mapping changes from IDCS will take five minutes to sync with the application. If these changes are made during the active user session then it will be reflected on the next login.
· You can create and manage Application users as per your requirements. For example, you can map Pipeline Admin group and CM Admin group to one user.
Role-based security in Oracle FCCM Transaction Filtering Cloud Service controls who can do what on which data.
The following table summarizes role-based access.
Component |
Description |
Who |
The role assigned to a user. |
What |
The functions which users with the role can perform. |
Which Data |
The set of data which users with the role can access when performing the function. |
The following table provides examples of role-based access.
Who |
What |
Which Data |
Data Administrators |
Prepare and ingest data |
Business data |
Case Analysts |
View, analyze, and act on cases |
Business data and Operational data |
The following table provides the User Group and User Role mapping.
User Groups |
User Roles |
Activities |
TF Administrator Groups |
TF Administrator | Map users to TF Admin Group |
CM Analyst Group |
CM Analyst | Map users to CM Analyst Group |
CM Supervisor Group |
CM Supervisor | Map users to CM Supervisor Group |
The following table details the privileges in Customer Screening.
Privileges |
TF Administrator |
CM Analyst |
CM Supervisor |
Manage private watch lists |
X
|
||
Manage synonyms & stop words |
X
|
||
Manage Index Management UI |
X
|
||
Map jurisdictions to pipelines |
X
|
||
Search for cases |
X | X | |
Investigate cases |
X | X | |
Set a case due date |
X | X | |
Recommend case closure |
X | ||
Approve or reject recommendations to close cases |
X | ||
Close cases |
X | X | |
Configure jurisdictions and business domains |
X | ||
Configure case statuses, actions, types, and priority |
X
|
|
|
Configure security mappings |
X
|
|
|
Configure case system parameters |
X
|
|
|
Configure & monitor PMF workflows |
X
|
|
|