Roles-Based Applications Security: Explained
In Oracle Applications Cloud, users have roles through which they gain access to functions and data. Users can have any
number of roles. Roles are grouped hierarchically to reflect lines of authority and responsibility. User access to functions and
data is determined by roles arranged in hierarchies and provisioned to that user.
Role-based security in Oracle Applications Cloud controls who can do what on which data. In role-based access:
SH Manage InventoryMovementRequest
1- Create DutyRoles
- SH ItemInquiry
- SH Warehouse MovementRequests
2- Create JobRoles
AddRole To User
Run Retrieve LatestLDAP ChangesProcess
User LoginAndTest Transaction
Or You Can Create AsCopy
Practice For Copy Role and Restrict To :
1- Create MiscellaneousTransaction
2- ItemInquiry
3- Put AwayManagement
4- ViewOn-HandQuantityValue
After
Create NewRole
AddTo FunctionSecurityPolicies
SH Put AwayManagement
Create MiscellaneousTransaction
Create Data SecurityPolicies
Save and Close
User Data AccessFor InventoryOrganization
Run Retrieve LatestLDAP Changes
Submit
Done

Customized security roles