ultimateApp RBAC

Description

Note on ultimateApp RBAC, created by davidhsc on 11/11/2013.
davidhsc
Note by davidhsc, updated more than 1 year ago More Less
davidhsc
Created by davidhsc over 10 years ago
davidhsc
Copied to Note by davidhsc over 10 years ago
567
0

Resource summary

Page 1

systemUserAdmin Rol Defining Application User Profile Predefined responsibilities making Credentials defining resposibilities User Session Limits Session Timeout

RBAC

fist user logoninitial pass change process

logon process

Function securityFunction Register

You allow a new user to sign-on to TheUltimateApp by defining an application user. An application user has a username and a password. systemAdmin  Rol define an initial password, then the first time the application user signs on, they must enter a new (secret) password.

1.- An application user has a username and a password. SystemAdmin Rol define an initial password.  2.- When you define an application user, you assign to the user one or more responsibilities. A responsibility provides a context in which a user operates. This context can include profile option values, navigation menus, available concurrent programs, and so on.

System Administrator, you define ultimateAppSuite users, and assign one or more responsibilities to each user.

You define userName and password.  Passwords are  Case Sensitivity.

When you define a responsibility, you assign to it some or all of the components described below: 1.- Menu (Required) 2.- Data Group (Required) 3.- Function and Menu Exclusions (Optional)

UltimateAppSuite products are installed with predefined responsibilities.  SystemAdmin Rol is one of them.

Rol Based Access Control By using RBAC, administrators have more granular control in granting submission privileges to users.

Using the following profile options you can specify limits on user sessions.

During comparison, if the entered password does not match the decrypted version, then an error message is displayed. 

Function security s the mechanism by which user access to applications functionality is controlled.

Application developers register functions when they develop forms. A system administrator administers function security by creating responsibilities that include or exclude particular functions.

Oracle Application Object Library Securityhttp://docs.oracle.com/cd/E18727_01/doc.121/e12843/T156458T156461.htm#I_cx2Dsecure

http://docs.oracle.com/cd/E18727_01/doc.121/e12843/T156458T185608.htm

Access Control with Oracle User Managementhttp://docs.oracle.com/cd/E18727_01/doc.121/e12843/T156458T185608.htm

Users Users are individuals who have access to software applications at a particular enterprise.A user must have a unique name and should map one-to-one with an individual human or system. "Group" accounts are not correct uses of the user entity.

Groups Users can belong to Groups. The grouping can come from position or organization relationships modeled in applications such as Oracle Human Resources. Alternatively, ad-hoc groups can be created explicitly for security purposes. A group is sometimes referred to as a role.

ultimateApp RBAC

Anotaciones

Resources

glosario

Show full summary Hide full summary

Similar

Geometry Formulas
Selam H
Gender Theorists
Hazel Meades
Was the Weimar Republic doomed from the start?
Louisa Wania
Biology 1 Keeping Healthy Core GCSE
Chloe Roberts
Revolutions and Turmoil: Russia 1905-1917
Emily Faul
Computing Hardware - CPU and Memory
ollietablet123
Sociology - Unit 1:Families and households
Jake Pickup
Mind Maps with GoConqr
croconnor
Biology (B2)
Sian Griffiths
OCR gcse computer science
Jodie Awthinre
2PR101 1.test - 7. část
Nikola Truong