What is the recommended way to grant data access to your sales manager?

Your sales manager needs access to accounts payable disbursement information in the Oracle
Fusion Sales application.
What is the recommended way to grant data access to your sales manager?

Your sales manager needs access to accounts payable disbursement information in the Oracle
Fusion Sales application.
What is the recommended way to grant data access to your sales manager?

A.
By default, the user provisioned with the Sales Manager job role within his or her business unit
is authorized to view AP disbursements.

B.
Have the Disbursement Process Manager role grant access to the AP Disbursement business
object for the Sales Manager role within his or her business unit.

C.
The sales manager’s job duties do not allow for the viewing of accounts payable
disbursements.

D.
Assign the Accounts Payable Disbursement data role with specific entitlement to the sales
manager user for his or her business unit.

E.
Move the Accounts Payable role with the Sales Manager role for that user, so that the Accounts
Payable data role is inherited by default.

Explanation:
The Disbursement Process Management Duty role includes entitlement to build
documents payable into payments. The Accounts Payable Manager job role inherits the
Disbursement Process Management Duty role. Data security policies for the Disbursement
Process Management Duty role authorize access to data associated with business objects such
as AP disbursements within a business unit. As a result, the user provisioned with the Accounts
Payable Manager job role is authorized to view AP disbursements within their business unit.
Note:Data Security Policies
Data security policies articulate the security requirement “Who can do What on Which set of data,”
where ‘Which set of data’ is an entire object or an object instance or object instance set and ‘What’
is the object entitlement.
For example, accounts payable managers can view AP disbursements for their business unit.
Oracle Fusion Applications Sales Implementation Guide,Data Security: Explained



Leave a Reply 0

Your email address will not be published. Required fields are marked *