This series of documents is intended to illustrate the options that we
have to map UIs to code artifacts and to inspect their structure. In
previous articles we covered the process for finding code artifacts for
customizations using the Page Composer
and finding ADFbc objects related
to the page using the JDeveloper
. In this article we will look at
mapping security permissions to roles and users.
In order to test
the customizations we will need to know the user with access to the
page and the credential for the user. While the user can be determined
from the policy and identity stores the credential cannot and as such
credential must be obtained from the system administrator.
steps assume that the reader is familiar with the concepts of Fusion
Application security such as roles and permissions covered in Fusion
Security (Part 1: Overview)