Introduction
Oracle Fusion Applications generate extensive audit logs that capture every significant security and business event across your SaaS environment. These logs include user authentication events, authorization decisions, administrative changes, transaction-level activities, and platform-level operations. For organizations running Fusion Applications across multiple modules (ERP, HCM, SCM, CX, EPM), centralizing these audit logs in OCI Log Analytics enables:
OCI Log Analytics provides the ideal destination for Fusion Applications audit data, offering powerful exploration capabilities, correlation with other log sources, detection rules, and AI-powered analysis through LoganAI. By leveraging the REST API-based log collection method with OCI Management Agents, organizations can establish continuous, automated ingestion of Fusion audit logs without complex middleware or custom integrations.

Note: I have published a blog post on the Fusion Enterprise Scheduler Service (ESS) audit logs collection using OCI Management Agent and REST API log collection, you can find it here.
However, accessing and collecting Fusion Application audit logs requires understanding the complex permission model and configuring the appropriate integration mechanisms. This blog post addresses the first of the two critical aspects:
- Understanding Required Permissions: What privileges and roles are needed to access Fusion audit log data
- Setting Up Log Ingestion: Step-by-step configuration for Fusion Apps Audit Logs using OCI Management Agent and REST API log collection
Note: This guide focuses on Fusion Applications transaction and business object audit logs accessed via the Fusion Audit REST API. For IAM Identity Domain audit events (sign-in attempts, MFA challenges, session activity), these flow through OCI Audit and can be ingested via Service Connector – see Methods and Ways to Extract Session Information Using OCI Audit for that complementary approach.
Solution Design
Oracle Log Analytics enables continuous collection of Fusion Application audit logs through REST API-based log sources. The Management Agent acts as the collector, periodically invoking Fusion Applications REST APIs to fetch audit log data and forwarding it to Log Analytics for parsing, indexing, and analysis.
Reference Architecture:

Prerequisites
Before proceeding with the implementation, ensure you have:
- An active OCI tenancy with appropriate IAM permissions
- Access to Oracle Fusion Applications with administrative privileges
- An OCI Compute instance (Oracle Linux) where the Management Agent will be installed
- Network connectivity between the Management Agent host and your Fusion Applications instance
- Understanding of your Fusion Applications POD URL and LOGIN URL (refer to Doc ID 2661308.1 in Oracle My Support)
- Create a service account in Fusion Applications for the Management Agent to use
Part 1: Understanding Required Fusion Applications Audit and Security Logs Permissions
Accessing Fusion Application audit logs requires a combination of Fusion Applications privileges. This section provides a comprehensive overview of the permission requirements.
Service Account Setup
For REST API access, you need to create a service account (integration user) in Fusion Applications:
- Sign in to Oracle Fusion Applications using administrator privileges.
- Navigate to:
- Tools > Security Console > Users
- Create a service account (integration user) with the following details:
- Last Name:
SERVICE_APP_ICS_ID - Email: Valid email address
- User Name:
SERVICE_APP_ICS_ID - Person Type: None
- Last Name:
- Assign the following privilege to the service account user:
- FND_MANAGE_AUDIT_POLICIES_PRIV
- Purpose: Enables configuring audit policies for Fusion Applications transactions and platform events.
- How: Grants access to the Manage Audit Policies page.
- Note: Auditing cannot be configured within a sandbox environment.
- FND_MANAGE_AUDIT_POLICIES_PRIV
Recommended Core Audit and Security Logs Privileges
Sign In – Sign Out Activity Logs
You can get the last seven days of user sign-in sign-out information using a setting available on the Add User Account page in Security Console. To view the setting, you must enable a profile option.
- The “Sign In – Sign Out” audit data requires an additional Fusion Applications enablement step that is separate from role/privilege assignment.
- Data availability limitation: Sign-in/sign-out audit data is available for the last seven days only.
- Enable the profile option:
- In Setup and Maintenance
- Open the side bar to search task


- Open the task Manage Administrator Profile Values
- Search for Profile Option Code:
ASE_ADVANCED_USER_MANAGEMENT_SETTING - Set the profile option value Site to Yes
- Click Save and Close

- Enable administration access for the integration user:
- In Security Console, go to Users
- Open the integration user (or when creating it via Add User Account)
- In Advanced Information, enable Enable Administration Access for Sign In-Sign Out Audit REST API
- Reference: How to Get User Sign-in Sign-out Information?
Fusion ERP, HCM, SCM, CX Audit Logs
| Component | Role/Privilege | Provides |
|---|---|---|
| Internal Auditor | ORA_FND_INTERNAL_AUDITOR_JOB | FND_VIEW_AUDIT_HISTORY_PRIV – Access to audit history data via REST API |
| Identity Integration Privilege | ASE_REST_SERVICE_ACCESS_IDENTITY_INTEGRATION_PRIV | Access to Fusion REST API endpoints: fscmRestApi, fndAuditRESTService, audittrail, getaudithistory |
Oracle Platform Security Services (OPSS) Audit Logs
Oracle Platform Security Services (OPSS) audit enables auditing of security-related events, such as authentication and authorization, across Oracle Fusion Applications. To enable OPSS audit logging, follow these steps:
By default, auditing is disabled for all Oracle Fusion Applications, including Oracle Platform Security Services (OPSS). To enable or disable auditing for OPSS, follow these steps:
- Access Manage Audit Policies:
In the Setup and Maintenance work area, search for and select the Manage Audit Policies task.
- Set Audit Level for OPSS:
- On the Manage Audit Policies page, locate Oracle Platform Security Services in the list.
- To enable auditing, set the Audit Level to
Low - Critical Events Only. - To disable auditing, set the Audit Level to
None. - Click Save and Close to confirm and apply your changes.
Note:
To manage audit policies, you must have the Manage Audit Policies (FND_MANAGE_AUDIT_POLICIES_PRIV) function security privilege. The predefined Application Implementation Consultant job role includes this privilege. If you want to want to use the Security – Audit Real Time subject area in Oracle Transactional Business Intelligence (OTBI) to access OPSS audit data. Access to this OTBI subject area requires the FBI_SECURITY_TRANSACTION_ANALYSIS_DUTY duty role. The predefined IT Security Manager job role contains this duty role.
Enterprise Scheduler Service (ESS) Audit Logs
Users can view and manage the scheduled processes that they submit, for example, to cancel the process or see the output. However, to perform these actions for scheduled processes submitted by other users, specific roles are required.
Here are the roles and the capabilities they provide for managing scheduled processes submitted by anyone, the ESS Monitor Role is sufficient for viewing the scheduled process history.
| Role Name | Role Code | View | Update | Cancel | See Output | Republish Output |
|---|---|---|---|---|---|---|
| ESS Operator Role | ESSOperator | Yes | No | No | No | No |
| ESS Monitor Role | ESSMonitor | Yes | No | No | No | No |
| ESS Administrator Role | ESSAdmin | Yes | Yes | Yes | Yes | No |
| BI Administrator Role | BIAdministrator | No | No | No | Yes | Yes |
The privilege required to access for all Scheduled Process is ESS_REQUEST_HISTORY.
- Open Security Console and go to the Roles page. Click Create Role.
- (Optional) On the Data Security Policies page:
- Add a policy with:
- Data Resource:
ESS_REQUEST_HISTORY - Data Set: All Values
- Actions: Select desired tasks (e.g., View, Update, Cancel).
- Data Resource:
- Add a policy with:
- On the Role Hierarchy page, add any needed roles.
- On the Users page, assign the users who need this custom role.
You can also update the Audit Level for Oracle Enterprise Scheduling Service (ESS) for ESS metadata changes, ESS request operations, Administrative operations to ESS request processor and dispatcher.
- Access Manage Audit Policies:
- In the Setup and Maintenance work area, search for and select the Manage Audit Policies task.
- Set Audit Level for ESS:
- On the Manage Audit Policies page, locate Enterprise Scheduler Service in the list.
- To enable auditing, set the Audit Level to
Medium - Some Events. - Click Save and Close to confirm and apply your changes.
Oracle Metadata Services (MDS) Audit Logs
The Oracle Metadata Services (MDS) audit enables auditing of metadata changes in Oracle Fusion Applications. To enable MDS audit logging, follow these steps:
- Access Manage Audit Policies:
- In the Setup and Maintenance work area, search for and select the Manage Audit Policies task.
- Set Audit Level for MDS:
- On the Manage Audit Policies page, locate Oracle Metadata Services in the list.
- To enable auditing, set the Audit Level to
Medium - Some Events. - Click Save and Close to confirm and apply your changes.
Oracle SOA Suite Audit Logs
The Oracle SOA Suite audit enables auditing of SOA Suite events in Oracle Fusion Applications. To enable SOA Suite audit logging, follow these steps:
- Access Manage Audit Policies:
- In the Setup and Maintenance work area, search for and select the Manage Audit Policies task.
- Set Audit Level for SOA Suite:
- On the Manage Audit Policies page, locate Oracle SOA Suite in the list.
- To enable auditing, set the Audit Level to
Medium - Some Events. - Click Save and Close to confirm and apply your changes.
Oracle Fusion Applications Business Object Audit Logs
To configure which attributes appear in the audit report for Oracle Fusion Applications business objects, follow these steps (adapted from Oracle documentation):
- Access Manage Audit Policies:
- In the Setup and Maintenance work area, search for and select the Manage Audit Policies task.
- Under Fusion Applications Business Objects section, set Audit Level to Auditing
- Under Fusion Applications Business Objects section, click Configure Business Object Attributes:
- Select Product and Object:
- From the Product list, select the relevant product. For example:
- Global Human Resources for Log Analytics Fusion Apps: HCM People Audit Logs Log Source
- Global Payroll for Log Analytics Fusion Apps: HCM Payroll Audit Logs Log Source
- Check the Audit checkbox for the relevant business object.

- From the Product list, select the relevant product. For example:
- Click Save and Close to confirm and apply your changes.
Conclusion
In Part 1, we explored how to enable and configure audit logging across key Oracle Fusion Applications components, including ESS, MDS, SOA Suite, and Business Objects. By following the steps outlined, you ensure critical business transactions and workflow activities are recorded, supporting your compliance and security monitoring objectives. Properly configured audit policies allow for effective tracking of user and system activity, forming the foundation for robust audit log collection and analysis in OCI Log Analytics.
In the next part, we will cover step-by-step guidance on ingesting these audit logs into Oracle Cloud Infrastructure, so you can gain actionable insights and streamline your audit compliance processes.
References
- ESS Roles Documentation
- Enable Audit for Oracle Platform Security Services
- Fusion Applications Audit Policies
- Fusion Applications Audit Report API
- HCM REST API Authorization
- How to Get User Sign-in Sign-out Information?
- Create a Fusion Service Integration User Account
- REST API Quick Start
- Doc ID 2661308.1 – Fusion Applications URLs and Configuration
- Doc ID 2059102.1 – How To Configure And Use Audit In BI Publisher For Fusion SaaS Cloud Customers
- Doc ID 2731495.1 – Fusion Applications OTBI: How To Configure And Use Audit For Usage and Performance In OTBI For Fusion SaaS Cloud Customers
