Chapter 10. A Role-based Approach to Automated Provisioning and a Personalized Portal

by Rex Thexton, Nishidhdha Shah, and Harish Gaur

Customers, partners, and employees all need access to enterprise data. But as IT enterprises grow more complex with new systems, interfaces, and applications, it becomes increasingly challenging to control and monitor who can access what IT resources.

Risks of ineffective permissions are substantial. Unauthorized users could gain access to IT resources and wreak havoc on the applications and data. Companies could risk not meeting rigorous security and privacy compliance requirements. And the IT help desk could spend countless hours mitigating these risks.

There are typically two areas in which the IT department feels ...

Get Oracle Fusion Middleware Patterns now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.