Managing the Policy Store

9-6 Oracle Fusion Middleware Application Security Guide The area Policy Store Provider is read-only and, when expanded, displays the policy store provider currently in use in the domain where the application is deployed.

2. To display roles in an application, expand the Search area, choose the application

or application stripe to search, enter the data to match a role name, and click the blue button. The results of the search are displayed in the table at the bottom of the page.

3. To create an application role, click Create to display the Create Application Role

page. Note that you need not enter data in all areas at once. For example, you could create a role by entering the role name and display name, save your data, and later on specify the members in it. Similarly, you could enter data for role mapping at a later time. In the area General, specify the following attributes of the role being created: 1. The name of the role, in the text box Role Name. 2. Optionally, the name to display for the role, in the text box Display Name. 3. Optionally, a description of the role, the text box Description. Note: If the page does not initially display application roles, click the blue button to display all items. Managing the Policy Store 9-7 In the area Members, specify the users, groups, or other application roles, if any, into which the role being created is mapped. To add application roles to the application role being created:

1. Click Add Application Role, to display the Add Application Role dialog.

2. In this dialog, identify the available role with a name matching a string by entering the string in the box Role Name, and then clicking the blue button; the result of the query is displayed in the Available Roles box.

3. Select roles from the box Available Roles, as appropriate, and use the buttons

in between the boxes to move them to the box Selected Roles. 4. When finished, click OK to return to the Create Application Role page. The selected application roles are displayed in the table Roles. To add groups to the application role being created:

1. Click Add Group, to display the Add Group dialog.

2. In this dialog, identify the available groups with a name matching a string by entering the string the box Group Name, and then clicking the blue button; the result of the query is displayed in the Available Groups box.

3. Select groups from the box Available Groups, as appropriate, and use the

buttons in between the boxes to move them to the box Selected Groups. 4. When finished, click OK to return to the Create Application Role page. The selected groups are displayed in the table Roles. To add users to the application role being created:

1. Click Add User, to display the Add User dialog.

2. In this dialog, identify the available users with a name matching a string by entering the string in the box User Name, and then clicking the blue button; the result of the query is displayed in the Available Users box.

3. Select users from the box Available Users, as appropriate, and use the buttons

in between the boxes to move them to the box Selected Users. 4. When finished, click OK to return to the Create Application Role page. The selected users are displayed in the table Users. 4. At any point you can remove an item from the table by selecting it and clicking the Delete button; similarly, you can modify an item from the table by selecting it and clicking the Edit button. 5. Click OK to effect the role creation or update and to return to the Application Roles page. The role just created is displayed in the table at the bottom of that page. 6. To create an application role based on an existing one: 1. Select an existing role from the table.

2. Click Create Like, to display the Create Application Role Like page. Notice

that in this page the role and user tables are automatically filled in with the data extracted from the role you selected.

3. Modify the list of roles and users, as appropriate, and then click OK.

To understand how permissions are inherited in a role hierarchy, see Section 2.2.1, Permission Inheritance and the Role Hierarchy.