Monday Mar 30, 2015

Resources Roadmap for Customizing Security

Use this Resources Roadmap to get straight to the information you need to customize the security of your Fusion Applications.[Read More]

Tuesday Jan 13, 2015

Release 9: Security And Integration New Features

Learn about the new feature in Release 9 for use in your integration projects. [Read More]

Monday Oct 27, 2014

Using JWT to secure your cloud application integrations

Find out how to use JWT to pass user context between your integrated applications.
[Read More]

Thursday May 15, 2014

Customizing User Security

This short post is for those a little confused about the user security capabilities in Fusion Applications, and just want to understand the basics to get going.[Read More]

Monday Aug 26, 2013

Fusion Applications Security Roles Related to Customization

We’ve all been frustrated trying to create a customization and then at the crucial moment not being able to see the page, link or button required, and after wasting time researching why you find you have not been granted to required privilege. This post helps prevent some of that, helping you setting up your development environment and maybe also reducing governance risks from over-granting powerful customization capabilities to end users.[Read More]

Thursday Jun 06, 2013

Get Started with Fusion Web Services Integration

This document aims at helping to understand how Fusion web services documented in Oracle Enterprise Repository (OER) can be invoked by third party applications from different platforms. Fusion web services are also referred as ADF services because web services are developed in Fusion using ADF business components.[Read More]

Tuesday May 28, 2013

Finding Code Artifacts for Customization (Part 3)

This series of documents is intended to illustrate the options that we have to map UIs to code artifacts and to inspect their structure. In previous articles we covered the process for finding code artifacts for customizations using the Page Composer and finding ADFbc objects related to the page using the JDeveloper.   In this article we will look at mapping security permissions to roles and users.

In order to test the customizations we will need to know the user with access to the page and the credential for the user.  While the user can be determined from the policy and identity stores the credential cannot and as such credential must be obtained from the system administrator.

These steps assume that the reader is familiar with the concepts of Fusion Application security such as roles and permissions covered in Fusion Security (Part 1: Overview) .[Read More]

Monday Mar 18, 2013

Fusion Security: Overview

There is a wealth of documentation regarding security implementation for Fusion Applications; this series of articles is intended to collate information from various sources. The goal is to provide a high level overview of the implementation and components involved.

[Read More]
About

Follow us on twitter Fusion Applications Extensibility, Customizations and Integration forum Fusion Applications Dev Relations YouTube Channel
This blog offers news, tips and information for developers building extensions, customizations and integrations for Oracle Fusion Applications.

Search

Categories
Archives
« July 2015
SunMonTueWedThuFriSat
   
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
 
       
Today