What are the three ways in which Oracle Authorization Policy Manager may be used to create and administer data security policies?

What are the three ways in which Oracle Authorization Policy Manager may be used to create and
administer data security policies?

What are the three ways in which Oracle Authorization Policy Manager may be used to create and
administer data security policies?

A.
a database resource that references a foreign key corresponding to the database table or view of
the business object to be secured

B.
a role that has been provisioned with the users who can perform the granted actions

C.
a rule (also known as a condition) to define the available row instances in the form of a SQL
predicate or simple filler (stored as XML) defined on the rows of the database resource

D.
a role that has been provisioned with the users who can perform all actions without grant

E.
one or more actions (such as view, edit, or delete) performed on database records that
correspond to the operations supported by the business object, and which may include custom
operations

Explanation:
The Basic Security Artifacts
An application stripe is a logical subset of the domain policy store where the application policies are
kept.
The first distinction among security artifacts accessible with Authorization Policy Manager is
between global and application-specific artifacts.
Global artifacts include users, external roles, and system policies and they apply to all application
stripes. Even though system policies are stored in the domain policy store, in this release,
Authorization Policy Manager does not support viewing or managing system policies. System
policies are instead managed with Fusion Middleware Control, as explained in Oracle Fusion
Middleware Application Security Guide.
Application-specific artifacts include the resource catalog, application policies, application roles, and
role categories, and they apply to just an application stripe.
Note: Authorization Policy Manager does not support the management of users and external roles;
these artifacts can only be viewed with the tool. Their provision and management is typically
accomplished using Oracle Identity Manager. Changes to the identity store are immediately visible in
Authorization Policy Manager.
Reference; Oracle Fusion Middleware Administrator’s Guide for Authorization Policy Manager, The
Basic Security Artifacts



Leave a Reply 3

Your email address will not be published. Required fields are marked *