3.1 Role-Based Access Control
Role-based security in Oracle FCCM Customer Screening Cloud Service controls who can do what on which data.
The following table summarizes role-based access.
Table 3-1 Role-based Access
| Component | Description |
|---|---|
| Who | The role assigned to a user. |
| What | The functions which users with the role can perform. |
| Which Data | The set of data which users with the role can access when performing the function. |
The following table provides examples of role-based access.
Table 3-2 Examples of role-based access.
| Who | What | Which Data |
|---|---|---|
| Data Administrators | Prepare and ingest data | Business data |
| Case Analysts | View, analyze, and act on cases | Business data and Operational data |
Note:
The new user should have the following roles to access Home page of the Cloud application.
- Function read role
- Group read role
- User read role
- Role read role