3.1 Role-Based Access Control

Role-based security in Oracle FCCM Customer Screening Cloud Service controls who can do what on which data.

The following table summarizes role-based access.

Table 3-1 Role-based Access

Component Description
Who The role assigned to a user.
What The functions which users with the role can perform.
Which Data The set of data which users with the role can access when performing the function.

The following table provides examples of role-based access.

Table 3-2 Examples of role-based access.

Who What Which Data
Data Administrators Prepare and ingest data Business data
Case Analysts View, analyze, and act on cases Business data and Operational data

Note:

The new user should have the following roles to access Home page of the Cloud application.

  • Function read role
  • Group read role
  • User read role
  • Role read role