InterviewSolution
| 1. |
How Is Security For Oracle Fusion Application? |
|
Answer» Oracle Fusion Applications is highly secured, is of tightly coordinating the following security concerns and FEATURES.
Access provisioning and identity management :The Oracle Fusion Applications installation PROCESS creates an initial user and provisions that user with the administration roles necessary for initial setup. Oracle IM is available in Oracle Fusion Applications through integration with Oracle Fusion Middleware. Identity management in Oracle Fusion Applications involves creating and managing user identities, creating and linking user accounts, managing user access control through user role assignment, managing enterprise roles, and managing OIM workflow approvals and delegated administration. Segregation of duties policies:Segregation of duties (SOD) separates activities such as approving, recording, processing, and reconciling results so an enterprise can more EASILY prevent or detect unintentional errors and willful fraud Enforcement across tools, TECHNOLOGIES, data transformations, and access methods Enforcement across the information life cycle. Oracle Fusion Applications is highly secured, is of tightly coordinating the following security concerns and Features. Access provisioning and identity management :The Oracle Fusion Applications installation process creates an initial user and provisions that user with the administration roles necessary for initial setup. Oracle IM is available in Oracle Fusion Applications through integration with Oracle Fusion Middleware. Identity management in Oracle Fusion Applications involves creating and managing user identities, creating and linking user accounts, managing user access control through user role assignment, managing enterprise roles, and managing OIM workflow approvals and delegated administration. Segregation of duties policies:Segregation of duties (SOD) separates activities such as approving, recording, processing, and reconciling results so an enterprise can more easily prevent or detect unintentional errors and willful fraud Enforcement across tools, technologies, data transformations, and access methods Enforcement across the information life cycle. |
|