Introduction

A frequently raised governance and audit question in Oracle Fusion Cloud Applications is:

While a user held a specific role, what transactions were performed under that access?

Although this question appears straightforward, Oracle Fusion Cloud Applications implements a role based access control (RBAC) model in which access assignment, access configuration changes, and transaction execution are managed and audited through distinct mechanisms. Each of these components serves a defined purpose within the overall security framework.

Because these audit layers are intentionally structured to address different aspects of security and governance, attempts to directly associate a completed transaction with a specific role or privilege can lead to misunderstanding. A clear understanding of how Fusion security operates is essential to provide accurate, consistent, and Oracle aligned audit responses.

Objective

The objective of this article is to:

  • Provide a clear architectural explanation of the Oracle Fusion role-based access control model
  • Distinguish between access assignment, access change history, and transaction auditing
  • Present a structured and Oracle aligned approach to correlating access configuration with transactional activity
  • Support governance, compliance, and audit readiness through accurate interpretation of Fusion security data

Details

We will cover this in three parts –

Section 1 – How Oracle Fusion RBAC Works

Oracle Fusion Cloud Applications implements a role based access control model using various role types in which access is derived through structured inheritance.

Access Structure

  1. A user is assigned:
    • Abstract roles
    • Job roles
  2. Job roles inherit:
    • Duty roles
    • Aggregate privileges
  3. Privileges are mapped to:
    • Resource types such as user interface components, REST services, and scheduled processes
    • Specific resource or artifact identifiers
    • Defined actions such as view, manage, execute, get, or post
Fusion Cloud Application RBAC - Fusion Security Authorization Model
Oracle Fusion Cloud Application RBAC – Functional Security Authorization Model

Additionally, data roles are derived from job roles to associate functional access with scoped data security policies to restrict access to specific organizational data sets such as business units, legal entities, departments, or supervisory hierarchies.

Runtime Authorization Flow

At runtime:

  • All roles assigned to the user are evaluated
  • All inherited privileges are aggregated
  • Authorization is evaluated against the requested resource and action
  • The system records the authorization outcome = ALLOW / DENY
  • The specific evaluation path is not retained

This behavior reflects Oracle Fusion’s centralized authorization model, where access decisions are based on the user’s complete effective privilege set.

This is a critical architectural principle.

Section 2 – Access vs Usage vs Change History

Oracle Fusion separates access visibility, access change tracking, and transactional activity into distinct audit layers.

1. Access Assignment

Reports:

Refer: Section 3.h – User Role Membership Report
Methods to extract audit & monitoring data from Fusion cloud applications for SIEM Integrations

  • User and Role Access Audit Report (ESS Job)
    • Expands roles into effective access, including:
      • Duty roles
      • Functional privileges
      • Data security policies
    • Shows what access a user effectively has at the time the report is run

Refer: Section 3.g – User and Role Access Audit Report
Methods to extract audit & monitoring data from Fusion cloud applications for SIEM Integrations

These reports provide visibility into:

  • Roles assigned to users
  • Inherited duties and privileges
  • Effective access at the time the report is generated

This layer answers: Who has what access?

2. Access Change History

After enabling auditing for Application Roles, the Generate Audit Report provides the history of security configuration changes

Refer – Set Up Auditing for Oracle Fusion Applications

Audit Report:

This report captures:

  • Role membership additions and removals
  • Role creation, updates, and deletions
  • Privilege modifications within roles
  • The actor who performed the change
  • Timestamp of the change

OPSS Audit Report Events Parameters –

Audit Report

Example of Audit Report

Example of Audit Report


This audit information can also be downloaded by Fusion Audit REST API explained here

Refer: Section 5.b – Fusion Application Roles Audit
Methods to extract audit & monitoring data from Fusion cloud applications for SIEM Integrations

This layer answers: When did access change, and who performed the change?

3. Usage (Transaction Execution)

Usage information can be obtained through Business Object/Platform Configurations Auditing,  once auditing is enabled for the relevant business objects. Usage can also be partially inferred from transaction tables via standard WHO columns (CreatedBy, LastUpdatedBy), but by enabling auditing provides finer-grained detail, including which attributes were changed.

Business objects/ Platform Configuration auditing captures:

  • User who performed the transaction
  • Business object/Platform Configuration involved
  • Attribute changed
  • Timestamp
  • Old and new values

Fusion Audit REST End Point –  /fscmRestApi/fndAuditRESTService/audittrail/getaudithistory

Example  – Fusion Business Object  

Enabling audit for the Person business object and requesting audit history using the following payload:

Operation – POST

Request Payload

{
"fromDate":"2025-11-15 00:00:00",
"toDate":"2025-12-15 23:59:59",
"product":"hcmCore",
"businessObjectType":"oracle.apps.hcm.people.core.uiModel.view.ManagePersonVO",
"includeChildObjects":"true",
"includeAttributes":"true",
"attributeDetailMode":"true"
}

Response Payload

The response returns:

  • Who performed the change
  • When the change occurred
  • What business object and attribute were changed
  • Old and new values
"auditData": [
{
"voForeignKeyMap": {},
"userInternalName": "FIN_IMP",
"userName": "FIN_IMP",
"eventType": "Object Data Update",
"qualifiedBusinessObject": "oracle.apps.hcm.people.core.uiModel.view.ManagePersonEmailAddressVO",
"businessObject": "Person Email",
"description": "Person ID:Curtis Feitty/PersonId:Curtis Feitty",
"descriptionInternal": "Person ID:300000047888610/PersonId:300000047888622",
"attributeInternalName": "EmailAddress",
"attribute": "Email",
"oldValue": "curtis.feitty_zbic@oracledemos.com",
"newValue": "ccc.yyy@oracle.com",
"attributeDetails": [
{
"attributeInternalName": "EmailAddress",
"attribute": "Email",
"oldValue": "curtis.feitty_zbic@oracledemos.com",
"newValue": “ccc.yyy@XXXX.com"
}
],
"date": "2025-12-10 11:42:09"
}

Similarly you can get Audit for Fusion platform configurations –

  • ESS (Enterprise Scheduler Service Jobs)
  • OPSS (Platform Security – Policy store for fusion )
  • MDS (Fusion Metadata/Sandbox)
  • SOA (Approval configuration)
  • ADF (ADF Page definition/Taskflow changes)

Audit data can also be downloaded via – Generate Audit Report Job explained here

ReferSection 4 – Fusion Business Object Audit [Transactions]
Section 5 – Fusion platform audit [Configurations]
Methods to extract audit & monitoring data from Fusion cloud applications for SIEM Integrations

This layer answers: What did the user do, and when?

Section 3 – The Audit Model (Capability-Based Correlation)

Oracle Fusion Cloud Applications supports governance and audit requirements through a structured correlation approach that aligns transactional activity with assigned access.

By correlating:

  1. Business Object/Platform Configuration Audit logs, which capture what the user did and when
  2. Role assignment history and access reports, which capture what access the user held at that time and how it was provisioned

Organizations can demonstrate that a transaction performed on date D1 occurred while the user held role R1, and that the role included privileges – P1 capable of performing the action (Delete)

This approach reflects the Fusion authorization model, where access is evaluated dynamically at runtime based on the user’s effective privileges.

Usage and Access Are tracked Separately in Fusion SaaS, Oracle Fusion SaaS tracks usage (transactions) and access (roles/privileges) through different audit mechanisms. These datasets are correlated for audit purposes.

Structured Correlation Process

To support audit and compliance objectives, the following steps are applied:

  1. Extract transaction audit records for the relevant time period
  2. Reconstruct the user’s role assignments at the time of the transaction
  3. Expand assigned roles into their effective privileges
  4. Validate that the effective access included privileges capable of authorizing the observed action

Through this structured methodology, Fusion audit capabilities enable organizations to align transaction evidence with effective access in a manner consistent with Oracle’s security architecture.

Fusion Cloud Application Audit Vs Usage Paths
Fusion Cloud Application Audit Vs Usage Paths

This approach provides a clear and Oracle aligned method to show that a transaction occurred while the user held access capable of performing the action.

Conclusion

Oracle Fusion Cloud Applications provides a structured security framework based on role based access control. Within this framework, access assignment, access changes, and transaction activity are managed and audited through clearly defined mechanisms.

Fusion provides visibility into:

  • What access a user has
  • When access was granted, modified, or revoked
  • What transactions were performed and when

When auditing is enabled, organizations can track:

  • Role membership additions and removals
  • Role and privilege modifications
  • The user who performed the change
  • The timestamp of the event
  • Old and new values associated with the change

By correlating transaction audit records with role assignment history and effective privilege definitions, organizations can demonstrate that user activity occurred within the scope of assigned access. This structured correlation approach aligns with Oracle’s security architecture and supports governance and compliance objectives.

Understanding the distinction between access configuration and transaction execution enables organizations to:

  • Provide accurate and consistent audit responses
  • Maintain controlled oversight of role changes
  • Implement structured access review processes
  • Strengthen least privilege and internal control practices

Governance Best Practices for Audit Readiness

To maintain audit readiness within Oracle Fusion:

  • Enable relevant audit policies for security and business objects
  • Enforce formal access change governance processes
  • Periodically generate and retain audit reports

Key Takeaway

Oracle Fusion maintains comprehensive audit records across access and transaction layers. Applying a structured and Oracle aligned correlation methodology enables organizations to confidently support governance, compliance, and audit requirements.

References

  1. Oracle Fusion Security Reference  
  2. Fusion Security Console
  3. Fusion Application Audit
  4. Audit Report
  5. Methods to extract audit & monitoring data from Fusion cloud applications for SIEM Integrations