By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
I'm not sure I understand what you mean by "implements". Certainly EBS uses roles and database privileges for authorization. Obviously, any user that logs in to EBS is authenticated. I believe that EBS creates database user accounts for each user and that each user authenticates to the database directly (i.e. it isn't "application" authentication, but database authentication).
Dig Deeper on Oracle database security
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.