Setting Up Object Security

Your company must design a security system that meets its particular needs. For information, recommendations, and examples of security system design, see the Oracle Life Sciences Data Hub Implementation Guide.

Your company must design a security system that meets its particular needs. For information, recommendations, and examples of security system design, see the Oracle Life Sciences Data Hub Implementation Guide.

Each time a user tries to perform an operation on a defined object, the system runs a check that compares the security privileges of the user with the security requirements of the object.

A user can operate on an object only if both these conditions are met:

  • The user belongs to an active user group that is assigned to that object, either explicitly or through inheritance.
  • The user has a role in that user group that permits the operation on the object's subtype.

The Oracle Life Sciences Data Hub Implementation Guide has information on designing an appropriate set of object subtypes, roles, and user groups to meet your company's needs.

This section contains the following topics: