By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
I'm not sure I understand what you mean by "implements". Certainly EBS uses roles and database privileges for authorization. Obviously, any user that logs in to EBS is authenticated. I believe that EBS creates database user accounts for each user and that each user authenticates to the database directly (i.e. it isn't "application" authentication, but database authentication).
Dig Deeper on Oracle database security
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.