Introduction Fusion Applications (FA) patching is a regular administrative task during a Fusion Apps release life-cycle. Patches for Fusion Applications (P4FA)...
Introduction Fusion Applications (FA) patching is a regular administrative task during a Fusion Apps release life-cycle. Patches for Fusion Applications (P4FA) are special collections of one-off fixes and tech stack updates (i.e. for Fusion Middleware, Database, Weblogic Server etc) compiled and certified for Fusion Applications where an installation of them improves system stability and performance substantially. Every FA release has its own set of P4FA patches and it's...
Introduction Fusion Applications (FA) patching is a regular administrative task during a Fusion Apps release life-cycle. Patches for Fusion Applications (P4FA) are special collections of one-off fixes...
Introduction Fusion Applications Security is designed based on Role-Based Access Control (RBAC). It is an approach to restricting access to authorized users....
Introduction Fusion Applications Security is designed based on Role-Based Access Control (RBAC). It is an approach to restricting access to authorized users. In general, RBAC is defined based on the primary rules as per this wiki page. RBAC normalizes access to functions and data through user roles rather than only users. User access is based on the definition of the roles provisioned to the user. RBAC secures access in a "Who can do what on which functions or sets of data...
Introduction Fusion Applications Security is designed based on Role-Based Access Control (RBAC). It is an approach to restricting access to authorized users. In general, RBAC is defined based on the...
Introduction I've heard from several customers lately who have asked about unexpected growth in XML_DOCUMENT table compared to other BPM tables. This blog looks...
Introduction I've heard from several customers lately who have asked about unexpected growth in XML_DOCUMENT table compared to other BPM tables. This blog looks into the reasons for this growth and some suggestions on how to mitigate it. Test Project In order to demonstrate XML_DOCUMENT table growth we'll use the following process.... ... this has a simple embedded sub-process and a multi-instance embedded sub-process so we can monitor whether these have any impact. Both have...
Introduction I've heard from several customers lately who have asked about unexpected growth in XML_DOCUMENT table compared to other BPM tables. This blog looks into the reasons for this growth and...
Introduction One of the key aspects of Fusion Applications operations is the Users and Roles management. Fusion Applications uses the Oracle Identity management...
Introduction One of the key aspects of Fusion Applications operations is the Users and Roles management. Fusion Applications uses the Oracle Identity management for its Identity store and policy store by default.This article explains how user and roles flows work from different poin of views, using 'key' IDM products for each flow in detail. With a clear understanding of the workings of the Fusion Applications with Identity Management for user provisioning and roles...
Introduction One of the key aspects of Fusion Applications operations is the Users and Roles management. Fusion Applications uses the Oracle Identity management for its Identity store and policy store...
Introduction: When accessing Fusion Applications (FA), a user typically requests their FA home page by typing in the URL in a browser window or clicking on a...
Introduction: When accessing Fusion Applications (FA), a user typically requests their FA home page by typing in the URL in a browser window or clicking on a favorites link. The user then logs in to the application and gets to the home page and performs various activities such as - navigate to different parts of the application, perform transactions, view existing transactions, run or schedule jobs and view/create reports, among other things. For the end user, all it takes is...
Introduction: When accessing Fusion Applications (FA), a user typically requests their FA home page by typing in the URL in a browser window or clicking on a favorites link. The user then logs in to...
Introduction Organizations strive to operate their business in a continuous manner with the goal of protecting their revenue, brand, and data assets. Every...
Introduction Organizations strive to operate their business in a continuous manner with the goal of protecting their revenue, brand, and data assets. Every organization, throughout its existence, is prone to failures originating from within or without. The propensity for failures exists. A resilient organization however does two things really well. First, it implements measures to recover from these failures and second, it institutes measures to prevent failures from...
Introduction Organizations strive to operate their business in a continuous manner with the goal of protecting their revenue, brand, and data assets. Every organization, throughout its existence,...
Introduction At times an administrator may need to identify which version of software one or more of the middleware components is within fusion applications. ...
Introduction At times an administrator may need to identify which version of software one or more of the middleware components is within fusion applications. Before downloading and installing ODI Studio, you would need to know which version of ODI that particular release of Fusion Applications was running. While this article references the BI software components, the same approach applies to most middleware tools within Fusion Applications. Main Article Assuming you have...
Introduction At times an administrator may need to identify which version of software one or more of the middleware components is within fusion applications. Before downloading and installing ODI...
Introduction In Fusion Applications, the status of SOA composite instances are either running, completed, faulted or staled. The composite instances become...
Introduction In Fusion Applications, the status of SOA composite instances are either running, completed, faulted or staled. The composite instances become staled immediately (irrespective of current status) when the respective composite is redeployed with the same version. The messages (payload) are stored in SOA audit tables until they are purged. The users can go through Enterprise Manager and view audit trails and respective messages of each composite. This is good for...
Introduction In Fusion Applications, the status of SOA composite instances are either running, completed, faulted or staled. The composite instances become staled immediately (irrespective of current...
Introduction The best option for ODI Changed Data Capture is to leverage Oracle GoldenGate. To understand how to best leverage the out-of-the-box integration...
Introduction The best option for ODI Changed Data Capture is to leverage Oracle GoldenGate. To understand how to best leverage the out-of-the-box integration between ODI and GoldenGate, we will review how ODI handles CDC with an in depth explanation of the JKMs principles, then expand this explanation to the specifics of the ODI-GoldenGate integration. Understanding the ODI JKMs and how they work with Oracle GoldenGate ODI is an ELT product. As such, it does not have its own...
Introduction The best option for ODI Changed Data Capture is to leverage Oracle GoldenGate. To understand how to best leverage the out-of-the-box integration between ODI and GoldenGate, we will review...