In this chapter we reviewed the security architecture of Oracle Fusion Applications. Oracle Fusion Applications provide a role-based approach for managing security within the application. This transcends frontend elements as well as data subsets.
The different types of roles and their relationships were discussed. User creation and related screenshots used for this task were also reviewed. A comparison with Oracle EBS was provided to enhance the understanding of Oracle Fusion security architecture.