which two layers of access control?

The default implementation of Oracle Applications makes use of which two layers of access
control? (Choose two.)

The default implementation of Oracle Applications makes use of which two layers of access
control? (Choose two.)

A.
Data Security

B.
Function Security

C.
Registration Processes

D.
DelegatedAdministration

E.
Self Service and Approvals

F.
RoleBased Access Control

Explanation:
Core Security includes Oracle’s Function and Data Security models, as well as Role
Based Access Control. Administrative Features build upon Core Security and include Delegated
Administration, Registration Processes, and Self Service and Approvals.
Core Security and Administrative Features are implemented in successive layers and each builds
upon the one that precedes it. Organizations can optionally uptake the various layers, depending
on the degree of automation and scalability that they wish to build upon the existing Function and
Data Security models.
In general, Access Control with Oracle User Management begins with basic system administration
tasks, progresses to more distributed, local modes of administration, and ultimately enables users
to perform some basic, predefined registration tasks on their own. The following diagram illustrates
how the layers build upon each other.
Oracle User Management Layers

Oracle User Management provides support for legacy and application-specific security
mechanisms through workflow business events. Oracle User Management raises these events
once a user’s request is approved. Organizations can then intercept these events, determine the
appropriate action, and assign any additional privileges that may be required.
Reference: Oracle E-Business Suite System Administrator’s Guide – Security
Access Control with Oracle User Management



Leave a Reply 0

Your email address will not be published. Required fields are marked *