{"id":7580,"date":"2021-08-06T10:57:15","date_gmt":"2021-08-06T10:57:15","guid":{"rendered":"https:\/\/www.gologica.com\/elearning\/?p=7580"},"modified":"2025-04-07T06:44:05","modified_gmt":"2025-04-07T06:44:05","slug":"various-roles-in-oracle-fusion-applications-security","status":"publish","type":"post","link":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/","title":{"rendered":"Various Roles in Oracle Fusion Applications Security"},"content":{"rendered":"<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.gologica.com\/courses\/\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/09\/Expand-Your-Knowledge-on-Latest-Tech-Courses-1024x576.jpg\" alt=\"\" class=\"wp-image-7875\" srcset=\"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/09\/Expand-Your-Knowledge-on-Latest-Tech-Courses-1024x576.jpg 1024w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/09\/Expand-Your-Knowledge-on-Latest-Tech-Courses-460x259.jpg 460w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/09\/Expand-Your-Knowledge-on-Latest-Tech-Courses-768x432.jpg 768w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/09\/Expand-Your-Knowledge-on-Latest-Tech-Courses-100x56.jpg 100w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/09\/Expand-Your-Knowledge-on-Latest-Tech-Courses-600x338.jpg 600w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/09\/Expand-Your-Knowledge-on-Latest-Tech-Courses-120x68.jpg 120w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/09\/Expand-Your-Knowledge-on-Latest-Tech-Courses-310x174.jpg 310w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/09\/Expand-Your-Knowledge-on-Latest-Tech-Courses.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/p>\n<p><strong>Objective:<\/strong><\/p>\n<p>In this article, we are going to discuss the various roles in <a href=\"https:\/\/www.gologica.com\/elearning\/oics-and-fusion-technical\/\"><strong><em>Oracle Fusion Applications<\/em><\/strong><\/a> security.<\/p>\n<p>Let&#8217;s move right into knowing the roles.<\/p>\n<p><strong>Roles in Oracle Fusion Applications:<\/strong><\/p>\n<\/p>\n<p>We will encounter the following roles in Fusion security:<\/p>\n<ul class=\"wp-block-list\">\n<li>Job Role<\/li>\n<li>Data Role<\/li>\n<li>Duty Role<\/li>\n<li>Abstract Role<\/li>\n<li>Data Access Set<\/li>\n<\/ul>\n<p><strong>Job Role:<\/strong>&nbsp;<\/p>\n<\/p>\n<p>The job roles are referred to as external roles. In general, these roles are created in APM (Authorization Policy Manager). A few examples of these roles include Chief Financial Manager, Payable Accountants Manager, Finance Controller, and so on. Also, many duties will be assigned to the job role. We can say, in other words, the job role must have the duty role. The duty of a Payable Accounts Manager includes approving invoices, creating invoices, running payment batches, and so on.<\/p>\n<\/p>\n<p style=\"text-align:center\" class=\"has-text-color has-medium-font-size has-vivid-red-color\"><strong><em>Related Blogs: <\/em><\/strong><a href=\"https:\/\/www.gologica.com\/elearning\/oracle-fusion-tax-overview-new-features\/\"><strong><em>Oracle Fusion Tax: Overview &amp; New Features<\/em><\/strong><\/a><\/p>\n<\/p>\n<p><strong>Data Role:\u00a0<\/strong><\/p>\n<\/p>\n<p>If we don&#8217;t want the UK ledger as per the business requirement to be accessed by the customer\/user in the US company\/organization, we take the data role&#8217;s help which requires it to be selectively assigned. When we create a business unit or ledger, the system automatically creates a job role with data-role access. When a job role is attached to the data role, the job role design is confined to a particular business unit or ledger. After it is done perfectly, the job role gets the data access. It can also perform needed functions that are related to the information\/data.<\/p>\n<p><\/p>\n<p><strong>Duty Role:&nbsp;<\/strong><\/p>\n<\/p>\n<p>The duty role is also referred to as the Application Role. Suppose a manager has a duty to approve invoices, create invoices, or create journals, then the duty of approving\/creating journals\/invoices is known as Duty Roles.<\/p>\n<p><\/p>\n<p><strong>Abstract Role:&nbsp;<\/strong><\/p>\n<\/p>\n<p>When a company\/organization hires an employee, he has to get a role-Employee by default, and he should get a role-Contingent worker in the case of a Contractor. The functions are known to be Abstract Roles.<\/p>\n<p><\/p>\n<p><strong>Data Access Set:&nbsp;<\/strong><\/p>\n<\/p>\n<p>The set of Data Access can be mainly related to the ledger data. Suppose we have various balancing segments within a ledger. We don&#8217;t want to give Company 01 access to the business interest of the customer\/user with access to Company 02. Hence, we must have to create some data access policies to do so. In turn, this will create a data role. Sometimes, when we create a ledger, it can also create a role by default that has access to the ledger. However, with the set of data access, the user can restrict the access to balancing the particular segment.<\/p>\n<\/p>\n<p><strong>Reference Implementation&#8217;s Role Hierarchies:<\/strong><\/p>\n<p><\/p>\n<p>In order to reflect an enterprise, the role hierarchies are structured. Job roles also inherit duty roles. Here&#8217;s an example for you: The job role of the accounts payable specialist inherits the Invoice Receiver Duty and Invoice Reviewer Duty roles. The job roles inherit many other job roles, like the Applications Implementation Consultant role and Controller job role. It can also inherit the roles of abstracts like Accounts Payable Manager job roles and Accounts Payable Specialist job roles, inheriting a Warehouse Manager and Employee abstract role, and the abstract role of Contingent Worker.&nbsp;<\/p>\n<p>Many of the job roles don&#8217;t grant access to the information\/data. In order to provide data access for such kinds of job roles, the user must generate the data roles by using the templates of the data role provided by the reference implementation. The data roles that a user generates must inherit the base job role. In addition, abstract roles can be used to inherit more abstract roles. The role of the employee inherits the abstract role of the Procurement Requester. It also inherited many other duty roles.<\/p>\n<\/p>\n<p><\/p>\n<p style=\"text-align:center\" class=\"has-text-color has-medium-font-size has-vivid-red-color\"><strong><em>Also Read: <\/em><\/strong><a href=\"https:\/\/www.gologica.com\/elearning\/oracle-fusion-cloud-services\/\"><strong><em>Oracle Fusion Cloud Services<\/em><\/strong><\/a><\/p>\n<\/p>\n<p><strong>Security Reference Implementation&#8217;s Function Security:<\/strong><\/p>\n<p><\/p>\n<p>The function security policies in the security reference implementation entitle an access role unconditionally in the Oracle Fusion Applications. The security of a predefined function consists of security policies and roles. Security reference implementation details can be viewed in the SRM (Security Reference Manuals) for every offering in authorization policy management. With the following standard approaches, the functions are secured:<\/p>\n<p>Duties Policies Segregation: If the enterprise roles fall outside the security reference implementation scope, one might be required to extend his applications of the <a href=\"https:\/\/www.gologica.com\/course\/oracle-fusion-hcm\/\"><strong><em>Oracle Fusion<\/em><\/strong><\/a><strong><em> <\/em><\/strong>with duty and job roles.<\/p>\n<p>Role-based access control:<\/p>\n<ul class=\"wp-block-list\">\n<li>Role hierarchy and duty roles for each abstract and job role<\/li>\n<li>Set of job roles<\/li>\n<li>Access entitlement granted to every duty role<\/li>\n<\/ul>\n<p><strong>Function Access Based on Duty and Job Roles:<\/strong><\/p>\n<\/p>\n<p>The defined Job duties consist of access to the functions of the application that are used in performing the duty. The security policies of predefined functions give entitlement to access functions for the purpose of actions carrying a duty. The segregated duties in a duty role are to prevent combining grants that should be separated across various multiple roles like recording, approving, and reconciling results.<\/p>\n<p><strong>Extending the Reference Implementation Function Security:<\/strong><\/p>\n<\/p>\n<p>The reference implementation of predefined security is a case that represents the guidelines of security. Your enterprise might need some additional roles with some specific constraints on the functions of the accessing application. Here&#8217;s an example for you:&nbsp;<\/p>\n<p>Your company\/enterprise is a bank with the role of a bank manager. Ensure to create this new role as a new group in the LDAP (Lightweight Directory Access Protocol), create the job roles task, or identify the store by performing the job roles management in the OIM (Oracle Identity Management). To inherit the bank manager&#8217;s duties, define the job role as defined by the predefined and available duty roles. Ensure to create a duty roles hierarchy for the role of new job by using the APM&#8217;s (Authorization Policy Manager) Manage Duties task.<\/p>\n<\/p>\n<p><\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.gologica.com\/course\/oracle-fusion-financials\/\"><img decoding=\"async\" width=\"800\" height=\"175\" src=\"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/ofusion-financial-1.jpg\" alt=\"\" class=\"wp-image-7582\" srcset=\"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/ofusion-financial-1.jpg 800w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/ofusion-financial-1-460x101.jpg 460w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/ofusion-financial-1-768x168.jpg 768w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/ofusion-financial-1-100x22.jpg 100w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/ofusion-financial-1-600x131.jpg 600w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/ofusion-financial-1-120x26.jpg 120w, https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/ofusion-financial-1-310x68.jpg 310w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>\n<\/p>\n<p>Suppose your enterprise is a pharmaceutical company; you might have users who have to perform the duties of clinical trial administration. Suppose the applications that a customer\/user must access to administer a clinical trial are already part of Oracle Fusion applications. In that case, there&#8217;s a new duty that can be created in the APM with the entitlement to the functions users or resource code to access for performing the duties of the trial administration.\u00a0<\/p>\n<\/p>\n<p><strong>Conclusion:<\/strong><\/p>\n<\/p>\n<p>I hope this article gives you detailed insights into the various roles in Oracle Fusion Applications Security. Still, if you have any queries, feel free to comment in the below section.<strong><em> <\/em><\/strong><a href=\"https:\/\/www.gologica.com\/\"><strong><em>Gologica<\/em><\/strong><\/a> is there for you to help. Contact us: 82969 60414. Happy Learning!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Objective: In this article, we are going to discuss the various roles in Oracle Fusion Applications security. Let&#8217;s move right &hellip;<\/p>\n","protected":false},"author":95,"featured_media":7873,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"pmpro_default_level":"","footnotes":""},"categories":[12],"tags":[276,308,739,740,352,467,364],"coauthors":[347],"class_list":["post-7580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-oracle_intervew_questions","tag-online-training","tag-oracle","tag-oracle-cloud","tag-oracle-fusion","tag-oracle-fusion-cloud-training","tag-oracle-fusion-financials","tag-training","pmpro-has-access","user-has-not-earned"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Various Roles in Oracle Fusion Applications Security - GoLogica<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Various Roles in Oracle Fusion Applications Security - GoLogica\" \/>\n<meta property=\"og:description\" content=\"Objective: In this article, we are going to discuss the various roles in Oracle Fusion Applications security. Let&#8217;s move right &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/\" \/>\n<meta property=\"og:site_name\" content=\"GoLogica\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-06T10:57:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-07T06:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"175\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kavya Sathvik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kavya Sathvik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/\"},\"author\":{\"name\":\"Kavya Sathvik\",\"@id\":\"https:\/\/www.gologica.com\/elearning\/#\/schema\/person\/be751af3a5dfedf6e0cb1010412e58ff\"},\"headline\":\"Various Roles in Oracle Fusion Applications Security\",\"datePublished\":\"2021-08-06T10:57:15+00:00\",\"dateModified\":\"2025-04-07T06:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/\"},\"wordCount\":1081,\"image\":{\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg\",\"keywords\":[\"Online training\",\"Oracle\",\"oracle cloud\",\"oracle fusion\",\"Oracle Fusion Cloud Training\",\"ORACLE FUSION FINANCIALS\",\"Training\"],\"articleSection\":[\"Oracle\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/\",\"url\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/\",\"name\":\"Various Roles in Oracle Fusion Applications Security - GoLogica\",\"isPartOf\":{\"@id\":\"https:\/\/www.gologica.com\/elearning\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg\",\"datePublished\":\"2021-08-06T10:57:15+00:00\",\"dateModified\":\"2025-04-07T06:44:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.gologica.com\/elearning\/#\/schema\/person\/be751af3a5dfedf6e0cb1010412e58ff\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#primaryimage\",\"url\":\"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg\",\"contentUrl\":\"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg\",\"width\":300,\"height\":175},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gologica.com\/elearning\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Various Roles in Oracle Fusion Applications Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gologica.com\/elearning\/#website\",\"url\":\"https:\/\/www.gologica.com\/elearning\/\",\"name\":\"GoLogica\",\"description\":\"E-Learning Portal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gologica.com\/elearning\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.gologica.com\/elearning\/#\/schema\/person\/be751af3a5dfedf6e0cb1010412e58ff\",\"name\":\"Kavya Sathvik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gologica.com\/elearning\/#\/schema\/person\/image\/6284dd535a9619a5b8003bfe2b3cf2af\",\"url\":\"https:\/\/lh3.googleusercontent.com\/a\/default-user=s96-c\",\"contentUrl\":\"https:\/\/lh3.googleusercontent.com\/a\/default-user=s96-c\",\"caption\":\"Kavya Sathvik\"},\"url\":\"https:\/\/www.gologica.com\/elearning\/author\/kavya5gologica\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Various Roles in Oracle Fusion Applications Security - GoLogica","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/","og_locale":"en_US","og_type":"article","og_title":"Various Roles in Oracle Fusion Applications Security - GoLogica","og_description":"Objective: In this article, we are going to discuss the various roles in Oracle Fusion Applications security. Let&#8217;s move right &hellip;","og_url":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/","og_site_name":"GoLogica","article_published_time":"2021-08-06T10:57:15+00:00","article_modified_time":"2025-04-07T06:44:05+00:00","og_image":[{"width":300,"height":175,"url":"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg","type":"image\/jpeg"}],"author":"Kavya Sathvik","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kavya Sathvik","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#article","isPartOf":{"@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/"},"author":{"name":"Kavya Sathvik","@id":"https:\/\/www.gologica.com\/elearning\/#\/schema\/person\/be751af3a5dfedf6e0cb1010412e58ff"},"headline":"Various Roles in Oracle Fusion Applications Security","datePublished":"2021-08-06T10:57:15+00:00","dateModified":"2025-04-07T06:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/"},"wordCount":1081,"image":{"@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg","keywords":["Online training","Oracle","oracle cloud","oracle fusion","Oracle Fusion Cloud Training","ORACLE FUSION FINANCIALS","Training"],"articleSection":["Oracle"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/","url":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/","name":"Various Roles in Oracle Fusion Applications Security - GoLogica","isPartOf":{"@id":"https:\/\/www.gologica.com\/elearning\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#primaryimage"},"image":{"@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg","datePublished":"2021-08-06T10:57:15+00:00","dateModified":"2025-04-07T06:44:05+00:00","author":{"@id":"https:\/\/www.gologica.com\/elearning\/#\/schema\/person\/be751af3a5dfedf6e0cb1010412e58ff"},"breadcrumb":{"@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#primaryimage","url":"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg","contentUrl":"https:\/\/www.gologica.com\/elearning\/wp-content\/uploads\/2021\/08\/Various-Roles-in-Oracle-Fusion-Applications-Security-1.jpg","width":300,"height":175},{"@type":"BreadcrumbList","@id":"https:\/\/www.gologica.com\/elearning\/various-roles-in-oracle-fusion-applications-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gologica.com\/elearning\/"},{"@type":"ListItem","position":2,"name":"Various Roles in Oracle Fusion Applications Security"}]},{"@type":"WebSite","@id":"https:\/\/www.gologica.com\/elearning\/#website","url":"https:\/\/www.gologica.com\/elearning\/","name":"GoLogica","description":"E-Learning Portal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gologica.com\/elearning\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gologica.com\/elearning\/#\/schema\/person\/be751af3a5dfedf6e0cb1010412e58ff","name":"Kavya Sathvik","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gologica.com\/elearning\/#\/schema\/person\/image\/6284dd535a9619a5b8003bfe2b3cf2af","url":"https:\/\/lh3.googleusercontent.com\/a\/default-user=s96-c","contentUrl":"https:\/\/lh3.googleusercontent.com\/a\/default-user=s96-c","caption":"Kavya Sathvik"},"url":"https:\/\/www.gologica.com\/elearning\/author\/kavya5gologica\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/posts\/7580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/comments?post=7580"}],"version-history":[{"count":2,"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/posts\/7580\/revisions"}],"predecessor-version":[{"id":7876,"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/posts\/7580\/revisions\/7876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/media\/7873"}],"wp:attachment":[{"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/media?parent=7580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/categories?post=7580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/tags?post=7580"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.gologica.com\/elearning\/wp-json\/wp\/v2\/coauthors?post=7580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}