OBIEE Security and Management

0
3K

Oracle Business Intelligence 12c is tightly integrated with the Oracle Fusion Middleware Security architecture and delegates core security functionality to components of that architecture. Specifically, any Oracle Business Intelligence installation makes use of the following types of security providers:

  • An authentication provider that knows how to access information about the users and groups accessible to Oracle Business Intelligence and is responsible for authenticating users.

  • policy store provider that provides access to application roles and application policies, which forms a core part of the security policy and determines what users can and cannot see and do in Oracle Business Intelligence.

  • credential store provider that is responsible for storing and providing access to credentials required by Oracle Business Intelligence.

By default, an Oracle Business Intelligence installation is configured with an authentication provider that uses the Oracle WebLogic Server embedded LDAP server for user and group information. The Oracle Business Intelligence default policy store provider and credential store provider store credentials, application roles and application policies in a database.

After installing Oracle Business Intelligence you can reconfigure the domain to use alternative security providers, if desired. For example, you might want to reconfigure your installation to use an Oracle Internet Directory, Oracle Virtual Directory, Microsoft Active Directory, or another LDAP server for authentication. You might also decide to reconfigure your installation to use Oracle Internet Directory, rather than a database, to store credentials, application roles, and application policies.

Several Oracle Business Intelligence legacy authentication options are still supported for backward compatibility. The best practice is to perform authentication and authorization using an identity store and authentication provider through the default security model described in this chapter. However, there are certain scenarios where this is not possible or where certain aspects of the legacy approach to authentication and authorization are required. Typically the use of these alternative methods requires that your user population and groups are not held in the identity store referenced by the authentication provider configured in the Oracle WebLogic domain. Consequently, when using alternative authentication methods, several sections of this chapter are not relevant.

Search
Sponsored
Categories
Read More
Games
Titel: "FC 25 Coins: Fifa 25 Münzen Xbox One kaufen – Die besten Angebote für Fifa 25 Coins kaufen!
Titel: FC 25 Coins: Fifa 25 Münzen Xbox One kaufen – Die besten Angebote für Fifa...
By Jone Thomas a month ago 0 110
Other
Migrating to Google Workspace from Exchange 2013: A Smart Business Move
As businesses seek modern, flexible, and scalable communication platforms, many are choosing to...
By Peter Groft 22 days ago 0 99
Health
Route Optimization Software Market Growth to Witness Rapid Surge during the Period 2022-2030
Route Optimization Software Market Highlights: "The global route optimization software market...
By Varsha Hole 3 years ago 0 2K
News
Top Crypto Airdrops to Watch in 2025: Don't Miss Out!
Crypto airdrops are one of the most exciting ways to gain free tokens while supporting innovative...
By Crypto Gem 2 months ago 0 311
Health
Understanding the Cost of Lasik Eye Surgery in Kolkata
Lasik Eye Surgery is frequently used to repair vision issues such as nearsightedness,...
By Gmoneyloans Gmoneyloans 2 years ago 0 2K