I'm not sure I understand what you mean by "implements". Certainly EBS uses roles and database privileges for authorization. Obviously, any user that logs in to EBS is authenticated. I believe that EBS creates database user accounts for each user and that each user authenticates to the database directly (i.e. it isn't "application" authentication, but database authentication).
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.