2.1.5.2.1 Role Based Access Control
Role-based security in Oracle Financial Services Funds Transfer Pricing Cloud Service Controls who can do what and to which data.
The following table provides examples of role-based access.
Table 2-2 Examples of Role Based Access
Role Assigned to a User | Functions which Users with this Role can Perform | Set of Data which Users with the Role can Access when performing the Function |
---|---|---|
Application Administrators | Perform Application Administrator activities | User Group with Administration Roles across all Service Features |
Business Users | Access to the Application to perform tasks | User Group with Business Tasks' Roles across all Service Features |