Role Level Security
Shows how to add role level security.
User access to user interface functions in Data Integration can be customized using role-level security. Roles are permissions that grant user access to functionsData Integration ships with two key roles: "Integration - Create" and "Integration – Run." These roles provide a fixed set of functions that can be performed by a user. Service administrators can add or remove functions available to a role as needed. For example, a service administrator can add the Edit Mapping function to the "Integration – Run." role or remove Period Mapping and Category Mapping from the "Integration - Create" role. After the functions are assigned to a role, the corresponding role is mapped to users when provisioning users in Application Management. The process of granting roles to users is described in the Data Integration Roles in Administering Access Control for Oracle Enterprise Performance Management Cloud.
To add role level security: