O'Reilly logo

Oracle Business Intelligence 11g R1 Cookbook by Cuneyt Yilmaz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Security in Oracle BI

In this chapter, we will cover:

  • Configuring security settings
  • Creating users
  • Creating groups
  • Creating application roles
  • Setting up permissions on repository objects
  • Configuring query limits
  • Specifying the time restrictions
  • Creating data filters

Introduction

In Business Intelligence projects, configuring security settings is one of the most important steps. Business users should be authenticated and they should only access the data which they need. In order to do this, we have to configure the authentication and the authorization methods.

The default authenticator is the WebLogic Server. We already discussed that OBIEE 11g is integrated with the WebLogic Server. The user accounts are going to be created in the WebLogic Server. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required