The default implementation of Oracle Applications makes use of which two layers of access
control? (Choose two.)
A.
Data Security
B.
Function Security
C.
Registration Processes
D.
DelegatedAdministration
E.
Self Service and Approvals
F.
RoleBased Access Control
Explanation:
Core Security includes Oracle’s Function and Data Security models, as well as Role
Based Access Control. Administrative Features build upon Core Security and include Delegated
Administration, Registration Processes, and Self Service and Approvals.
Core Security and Administrative Features are implemented in successive layers and each builds
upon the one that precedes it. Organizations can optionally uptake the various layers, depending
on the degree of automation and scalability that they wish to build upon the existing Function and
Data Security models.
In general, Access Control with Oracle User Management begins with basic system administration
tasks, progresses to more distributed, local modes of administration, and ultimately enables users
to perform some basic, predefined registration tasks on their own. The following diagram illustrates
how the layers build upon each other.
Oracle User Management LayersOracle User Management provides support for legacy and application-specific security
mechanisms through workflow business events. Oracle User Management raises these events
once a user’s request is approved. Organizations can then intercept these events, determine the
appropriate action, and assign any additional privileges that may be required.
Reference: Oracle E-Business Suite System Administrator’s Guide – Security
Access Control with Oracle User Management