Skip Headers
Oracle® Fusion Middleware Administrator's Guide for Oracle Business Intelligence Publisher
11g Release 1 (11.1.1)

Part Number E22255-02
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

3 Alternative Security Options

This chapter describes alternative security options for BI Publisher, including Single Sign-on (SSO), LDAP options, Oracle Access Manager (OAM), and Microsoft Active Directory.

It covers the following topics:

3.1 About Alternative Security Options

This chapter describes security concepts and options for a standalone implementation of Oracle BI Publisher, that is, not installed as part of the Oracle Business Intelligence Enterprise Edition. Note the following:

Use the information in this chapter to configure the following:

3.2 Authentication and Authorization Options

BI Publisher supports several options for authentication and authorization. You can choose a single security model to handle both authentication and authorization; or, you can configure BI Publisher to use a Single Sign-On provider or LDAP provider for authentication with another security model to handle authorization.

3.3 Understanding BI Publisher's Users, Roles, and Permissions

A user is assigned one or multiple Roles. A Role can grant any or all of the following:

You can create a hierarchy of roles by assigning roles to other roles. In this way the privileges and permissions of multiple roles can roll up to higher level roles. Figure 3-1 shows an example of the hierarchy structure of User, Role, and Folder.

Figure 3-1 Hierarchy Structure of User, Role, and Folder

Surrounding text describes Figure 3-1 .

3.3.1 Options for Configuring Users and Roles

There are three options for setting up users and roles:

3.4 About Privileges to Use Functionality

BI Publisher provides a set of functional roles to grant access to specific functionality within the application. Assign these roles to users based on their need to perform the associated tasks. These roles cannot be updated or deleted.

Table 3-1 shows the privileges granted to each functional role.

Table 3-1 Privileges Granted to Functional Roles

Role Privilege

BI Publisher Excel Analyzer

View Export History (public reports only) Grants access to the Excel Analyzer

BI Publisher Online Analyzer

View Export History (public reports only) Grants access to the Online Analyzer

BI Publisher Scheduler

View Export History Schedule

BI Publisher Template Designer

View Export History (public reports only) Enables access to Layout Editor Enables log on from Template Builder

BI Publisher Developer

View Export Schedule History Edit Report Enables access to Layout Editor Enables log on from the Template Builder Enables access to the Data Model Editor

BI Publisher Administrator

Enables the privileges of all other roles Grants access to the Administration page and all administration tasks


Roles assigned these privileges cannot perform any actions on objects in the catalog until they are also granted permissions on the catalog objects.

3.5 About Catalog Permissions

To perform the actions allowed by the functional roles above, a role must also be granted permissions to access the objects in the catalog. Table 3-2 describes permissions for roles.

Each of these permissions can be granted at the folder level to enable the operations on all items within a folder.

Table 3-2 Permissions for Roles

Permission Description

Read

Enables a role to display an object in the catalog. If the object resides within a folder, a role must be granted the Read permission on the object and its parent Folder.

Write

  • Report - requires the BI Publisher Developer role

  • Data Model - requires the BI Publisher Developer role

  • Sub Template and Style Template - requires the BI Publisher Developer Role or the BI Publisher Template Designer Role

Delete

Enables a role to delete an object.

Run Report Online

Enables a role to run a report and view it in the report viewer.

Schedule Report

Enables a role to schedule a report.

View Report Output

Enables a role to access the Report Job History for a report.


It is important to note that for a report consumer to successfully run a report, his role must have read access to every object that is referenced by the report.

For example, a report consumer must run a report in a folder named Reports. The data model for this report, resides in a folder named Data Models. This report references a Sub Template stored in a folder named Sub Templates, and also references a Style Template stored in a folder named Style Templates. The report consumer's role must be granted Read access to all of these folders and the appropriate objects within.

3.6 How Functional Privileges and Permissions Work Together

It is important to understand the following rules regarding the behavior of privileges and permissions:

3.6.1 A Role Must Be Assigned Catalog Permissions

A role assigned a functional role cannot perform any actions in the catalog until catalog permissions are granted. Note that the functional roles themselves (BI Publisher Developer, BI Publisher Scheduler, and so on) cannot be directly assigned permissions in the catalog. The functional roles must first be assigned to a custom role and then the custom role is available in the catalog permissions table.

3.6.2 A Role Can Be Granted Catalog Permissions Only

The permissions available directly in the catalog enable running reports, scheduling reports, and viewing report output. Therefore if your enterprise includes report consumers who have no other reason to access BI Publisher except to run and view reports, then the roles for these users consist of catalog permissions only.

3.6.3 Inherited Permissions

When a role is assigned one of the functional roles, and that role is granted permissions on a particular folder in the catalog, then some permissions are granted automatically based on the functional role.

For example, assume that you create a role called Financial Report Developer. You assign this role the BI Publisher Developer role. For this role to create reports in the Financial Reports folder in the catalog, you grant this role Read, Write, and Delete permissions on the folder. Because the BI Publisher Developer role includes the run report, schedule report, and view report history privileges, these permissions are automatically granted on any folder to which a role assigned the BI Publisher Developer role is granted Read access.

3.7 About Access to Data Sources

A role must be granted access to a data source to view reports that run against the data source or to build and edit data models that use the data source. Add access to data sources in the Roles and Permissions page. See Section 3.8.4, "Granting Data Access."

3.8 Configuring Users, Roles, and Data Access

The following procedures describe:

3.8.1 Creating Roles

To create a new role in BI Publisher:

  1. Navigate to the BI Publisher Administration page.

  2. Under Security Center, click Roles and Permissions.

  3. Click Create Role.

  4. Enter a Name for the role and optionally, enter a Description.

  5. Click Apply.

  6. Click Assign Roles to assign roles to the user.

  7. Use the shuttle buttons to move Available Roles to Assigned Roles. Click Apply.

  8. To add a role to a role, click Add Roles.

  9. Use the shuttle buttons to move Available Roles to Included Roles. Click Apply.

To add data sources to a role, see Section 3.8.4, "Granting Data Access."

3.8.2 Creating Users and Assigning Roles to a User

To create a new user in BI Publisher:

  1. Navigate to the BI Publisher Administration page.

  2. Under Security Center, click Users.

  3. Click Create User.

  4. Add the User Name and Password for the user.

  5. Click Apply.

  6. Click Assign Roles to assign roles to the user.

  7. Use the shuttle buttons to move Available Roles to Assigned Roles. Click Apply.

3.8.3 Granting Catalog Permissions

For a role to access an object in the catalog, the role must be granted Read permissions on both the object and the folder in which the object resides. Permissions can be granted at the folder level and applied to all the objects and subfolders it contains, or applied to individual objects.

To grant catalog permissions to a role:

  1. Navigate to the Catalog.

  2. Locate the folder or object on which to grant permissions and click More. From the menu (shown in Figure 3-2), select Permissions. Alternatively, you can select the folder and click Permissions in the Tasks region.

    Note:

    Permissions cannot be granted on the root Shared folder.

    Figure 3-2 More Menu

    Surrounding text describes Figure 3-2 .
  3. On the Permissions dialog (shown in Figure 3-3), click Create.

    Figure 3-3 Permissions Dialog

    Surrounding text describes Figure 3-3 .
  4. On the Add Roles dialog (shown in Figure 3-4), enter a search string to find a role, or simply click Search to display all roles. Use the shuttle buttons to move roles from the Available Roles list to the Selected Roles list.

    Figure 3-4 Add Roles Dialog

    Surrounding text describes Figure 3-4 .
  5. When finished, click OK to return to the Permissions dialog.

  6. On the Permissions dialog (shown in Figure 3-5), configure the permissions required by the role.

    Figure 3-5 Permissions Dialog

    Surrounding text describes Figure 3-5 .

    Note the following:

    • The icon next to the Report Developer role indicates that this role is assigned one of the BI Publisher functional roles (in this case, the BI Publisher Developer role).

    • Once the Report Developer role is assigned access to this folder, the following permissions are automatically granted based on the privileges that comprise the BI Publisher Developer Role: Run report online, Scheduler Report, View Report Output.

  7. If you are granting permissions on a Folder, select Apply permissions to items within this folder, if the permissions should apply to all objects.

3.8.4 Granting Data Access

A role must be granted access to a data source if the role must:

  • Run or schedule a report built on a data model that retrieves data from the data source

  • Create or edit a data model that retrieves data from the data source

To grant a role access to a data source:

  1. Navigate to the BI Publisher Administration page.

  2. Under Security Center, click Roles and Permissions.

  3. On the Roles and Permissions page, locate the role, then click Add Data Sources.

  4. On the Add Data Sources page you see a region for each of the following types of data sources:

    • Database Connections

    • File Directories

    • LDAP Connections

    • OLAP Connections

  5. Use the shuttle buttons to move the required data sources from the Available Data Sources list to the Allowed Data Sources list.

  6. When finished, click Apply.

3.9 Security and Catalog Organization

Because permissions are granted in the catalog, it is very important to be aware of this design when creating roles for your organization and when structuring the catalog.

For example, assume that your organization requires the roles that are described in Table 3-3.

Table 3-3 Example Role Requirements

Role Required Permissions

Sales Report Consumer

Needs to view and schedule Sales department reports.

Financial Report Consumer

Needs to view and schedule Financial department reports. Needs access to the Excel Analyzer.

Executive Report Consumer

Needs to consume both Sales and Financial reports and executive level reports.

Sales Report Developer

Needs to create data models and reports for Sales department only.

Financials Report Developer

Needs to create data models and reports for Financials department only. Needs to create some reports using the Excel Analyzer.

Layout Designer

Needs to design report layouts for all reports.


You might consider setting up the catalog structure as described in Table 3-4.

Table 3-4 Example Catalog Setup

Folder Contents

Sales Reports

All reports for Sales Report Consumer. Also contains any Sub Templates and Style Templates associated with Sales reports.

Sales Data Models

All data models for Sales reports.

Financials Reports

All reports for Financials Report Consumer. Also contains any Sub Templates and Style Templates associated with Financials reports.

Financials Data Models

All data models for Financials reports

Executive Reports

All executive-level reports and data models.


Set up the roles as follows:

Example Role Configuration

Sales Report Consumer:

Grant catalog permissions:

Grant Data Access:

On the Roles page, locate the role, then click Add Data Sources. Add all data sources used by Sales reports.

Financials Report Consumer

Assign Roles:

On the Roles tab assign the Financials Report Consumer the BI Publisher Excel Analyzer role.

Grant catalog permissions:

Grant Data Access:

On the Roles page, locate the role, then click Add Data Sources. Add all data sources used by Financials reports.

Executive Report Consumer

Assign Roles:

On the Roles tab, assign the Executive Report Consumer the Sales Report Consumer and the Financials Report Consumer roles.

Grant catalog permissions:

Grant Data Access:

On the Roles tab, locate the role, then click Add Data Sources. Add all data sources used by Executive reports.

Sales Report Developer

Assign Roles:

On the Roles tab, assign the Sales Report Developer the BI Publisher Developer Role and the BI Publisher Template Designer Role.

Grant Data Access:

On the Roles tab, locate the Sales Report Developer and click Add Data Sources. Add all data sources from which Sales data models are built.

Grant Catalog Permissions:

Financials Report Developer

Assign Roles:

On the Roles tab, assign the Financials Report Developer the BI Publisher Developer Role, the BI Publisher Excel Analyzer Role, and the BI Publisher Template Designer Role.

Grant Data Access:

On the Roles tab, locate the Financials Report Developer and click Add Data Sources. Add all data sources from which Financials data models are built.

Grant Catalog Permissions:

Layout Designer

Assign Roles:

On the Roles tab, assign the Layout Designer the BI Publisher Template Designer Role and the BI Publisher Developer Role.

Grant Catalog Permissions:

3.10 Configuring BI Publisher to Use an LDAP Provider for Authentication Only

To use an LDAP provider for authentication in conjunction with another security model for authorization, perform the following in BI Publisher:

To configure BI Publisher to use LDAP for authentication only:

  1. On the Administration page, under Security Center click Security Configuration.

  2. Create a Local Superuser.

    Enter a Superuser Name and Password and select Enable Local Superuser check box. Enabling a local superuser ensures that you can access the Administration page of BI Publisher in case of security model configuration errors.

  3. Scroll down to the Authentication region. Select the Use LDAP check box.

  4. Enter the following:

    • URL

      For example: ldap://example.com:389/

      If you are using LDAP over SSL, then note the following:

      • the protocol is "ldaps"

      • the default port is 636

      An example URL would be: ldaps://example.com:636/

    • Administrator Username and Password for the LDAP server

      The Administrator user entered here must also be a member of the XMLP_ADMIN group.

    • Distinguished Name for Users

      For example: cn=Users,dc=example,dc=com

      The distinguished name values are case-sensitive and must match the settings in the LDAP server.

    • JNDI Context Factory Class

      The default value is com.sun.jndi.ldap.LdapCtxFactory

    • Attribute used for Login Username

      Enter the attribute that supplies the value for the Login user name. This is also known as the Relative Distinguished Name (RDN). This value defaults to cn.

    • Attribute used for user matching with authorization system - enter the attribute that supplies the value to match users to the authorization system. For example, orcleguid.

  5. Click Apply. Restart the BI Publisher server.

3.11 Configuring BI Publisher to Use an LDAP Provider

BI Publisher can be integrated with the LDAP provider to manage users and report access. Create the users and roles within the LDAP server, then configure the BI Publisher server to access the LDAP server.

In the BI Publisher security center module, assign folders to those roles. When users log in to the server, they have access to those folders and reports assigned to the LDAP roles.

Integrating the BI Publisher server with Oracle LDAP consists of three main tasks:

  1. Set up users and roles in the LDAP provider

  2. Configure BI Publisher to recognize the LDAP server

  3. Assign catalog permissions and data access to roles

For information on supported LDAP servers, see "System Requirements and Certification" for the most up-to-date information on supported hardware and software.

3.11.1 Configuring the Client Application

The following steps must be performed in the LDAP provider. See the documentation for the provider for details on how to perform these tasks.

3.11.1.1 Set Up Users and Roles

To set up users and roles:

  1. In the Domain root node of the LDAP provider, create the roles that are described in Table 3-5 to integrate with BI Publisher. See Section 3.3, "Understanding BI Publisher's Users, Roles, and Permissions" for full descriptions of the required functional roles.

    Table 3-5 Roles to Integrate with BI Publisher

    BI Publisher System Group Description

    XMLP_ADMIN

    The administrator role for the BI Publisher server. You must assign the Administrator account used to access your LDAP server the XMLP_ADMIN group.

    XMLP_DEVELOPER

    Allows users to create and edit reports and data models.

    XMLP_SCHEDULER

    Allows users to schedule reports.

    XMLP_ANALYZER_EXCEL

    Allows users to use the Excel Analyzer feature.

    XMLP_ANALYZER_ONLINE

    Allows users to use the online analysis feature (online analyzer).

    XMLP_TEMPLATE_BUILDER

    Allows users to connect to the BI Publisher server from the Template Builder for Word and to upload and download templates. Allows users to design layouts using the BI Publisher Layout Editor.


  2. Create other functional roles as required by your implementation (for example: HR Manager, Warehouse Clerk, or Sales Manager), and assign the appropriate BI Publisher functional roles.

  3. Assign roles to users.

    Note:

    Ensure that you assign the Administrator account the XMLP_ADMIN role.

3.11.1.2 Configure the BI Publisher Server to Recognize the LDAP Server

To configure the BI Publisher server to recognize the LDAP server, you update the Security properties in the BI Publisher Administration page.

To configure the BI Publisher Server for the LDAP Server:

  1. On the Administration page, under Security Center click Security Configuration.

  2. Create a Local Superuser.

    Enter a Superuser Name and Password and select Enable Local Superuser check box. Enabling a local superuser ensures that you can access the Administration page of BI Publisher in case of security model configuration errors.

  3. Scroll down to the Authorization region. Select LDAP for the Security Model.

  4. Enter the following:

    • URL

      For example: ldap://example.com:389/

      If you are using LDAP over SSL, then note the following:

      • the protocol is "ldaps"

      • the default port is 636

      An example URL would be: ldaps://example.com:636/

    • Administrator Username and Password for the LDAP server

      The Administrator user entered here must also be a member of the XMLP_ADMIN group.

    • Distinguished Name for Users

      For example: cn=Users,dc=example,dc=com

      The distinguished name values are case-sensitive and must match the settings in the LDAP server.

    • Distinguished Name for Groups

      For example: cn=Groups,dc=us,dc=oracle,dc=com

      The default value is cn=OracleDefaultDomain,cn=OracleDBSecurity,cn=Products,cn=OracleContext,dc=example,dc=com

    • Group Search Filter

      The default values is (&(objectclass=groupofuniquenames)(cn=*))

    • Group Attribute Name

      The default value is cn

    • Group Member Attribute Name

      The default value is uniquemember

    • Member of Group Attribute Name

      (Optional) Set this attribute only if memberOf attribute is available for User and Group. Group Member Attribute is not required when this attribute is available. Example: memberOf or wlsMemberOf

    • Group Description Attribute Name

      The default value is description

    • JNDI Context Factory Class

      The default value is com.sun.jndi.ldap.LdapCtxFactory

    • Group Retrieval Page Size

      Setting this values enables support of the LDAPv3 control extension for simple paging of search results. By default, pagination is not used. This value determines the number of results to return on a page (for example, 200). Your LDAP server must support control type 1.2.840.113556.1.4.319 to support this feature, such as Oracle Internet Directory 10.1.4. See your LDAP server documentation for information on support of this control type.

      For more information about LDAP pagination and the required control type, see the article: RFC 2696 - LDAP Control Extension for Simple Paged Results Manipulation (http://www.faqs.org/rfcs/rfc2696.html).

    • Attribute used for Login Username

      Enter the attribute that supplies the value for the Login user name. This is also known as the Relative Distinguished Name (RDN). This value defaults to cn.

    • Automatically clear LDAP cache - to schedule the automatic refresh of the LDAP cache the LDAP cache per a designated interval, select this box. After you select this box the following additional fields become enabled:

      • Enter an integer for Ldap Cache Interval. For example, to clear the LDAP cache once a day, enter 1.

      • Select the appropriate Ldap Cache Interval Unit: Day, Hour, or Minute.

    • Default User Group Name

      (Optional) Use this option if your site has the requirement to allow all authenticated users access to a set of folders, reports, or other catalog objects. The user group name that you enter here is added to all authenticated users. Any catalog or data source permissions that you assign to this default user group are granted to all users.

    • Attribute Names for Data Query Bind Variables

      (Optional) Use this property to set attribute values to be used as bind variables in a data query. Enter LDAP attribute names separated by a commas for example: memberOf, primaryGroupID,mail

      See the section "Creating Bind Variables from LDAP User Attributes" in the Oracle Fusion Middleware Data Modeling Guide for Oracle Business Intelligence Publisher.

  5. Click Apply. Restart the BI Publisher server.

Figure 3-6 shows a sample of the LDAP security model entry fields from the Security Configuration page.

Figure 3-6 Sample of LDAP Security Model Entry Fields

Surrounding text describes Figure 3-6 .

If you are configuring BI Publisher to use LDAP over SSL, then you must also configure Java keystore to add the server certificate to JVM. For more information, see Section 4.3, "Configuring BI Publisher for Secure Socket Layer (SSL) Communication."

3.11.1.3 Assign Data Access and Catalog Permissions to Roles

To assign data access and catalog permissions to roles:

  1. Log in to BI Publisher as a user assigned the XMLP_ADMIN role in the LDAP provider.

  2. On the Administration page click Roles and Permissions.

    You see the roles that you created in the LDAP provider to which you assigned the XMLP_ roles. Note the following:

    • The XMLP_X roles are not shown because these are controlled through the LDAP interface.

    • The Users tab is no longer available under the Security Center because users are now managed through your LDAP interface.

    • Roles are not updatable in the BI Publisher interface, except for adding data sources.

  3. Click Add Data Sources to add BI Publisher data sources to the role. A role must be assigned access to a data source to run reports from that data source or to build data models from the data source. For more information see Section 3.8.4, "Granting Data Access."

  4. Grant catalog permissions to roles. See Section 3.5, "About Catalog Permissions" and Section 3.8.3, "Granting Catalog Permissions" for details on granting catalog permissions to roles.

Users can now log in using their LDAP username/password.

3.12 Integrating with Microsoft Active Directory

Microsoft Active Directory supports the LDAP interface and therefore can be configured with BI Publisher using LDAP Security.

3.12.1 Configuring the Active Directory

To configure the active directory:

  1. Add users who must access BI Publisher.

    Add the users under "Users" or any other organization unit in the Domain Root.

  2. Add the BI Publisher system groups. The Scope of the groups must be Domain Local.

    Table 3-6 describes the BI Publisher system groups that must be added.

    Table 3-6 BI Publisher System Groups

    BI Publisher System Group Description

    XMLP_ADMIN

    The administrator role for the BI Publisher server. You must assign the Administrator account used to access your LDAP server the XMLP_ADMIN group.

    XMLP_DEVELOPER

    Allows users to create and edit reports and data models.

    XMLP_SCHEDULER

    Allows users to schedule reports.

    XMLP_ANALYZER_EXCEL

    Allows users to use the Excel Analyzer feature.

    XMLP_ANALYZER_ONLINE

    Allows users to use the online analysis feature (online analyzer).

    XMLP_TEMPLATE_BUILDER

    Allows users to connect to the BI Publisher server from the Template Builder for Word and to upload and download templates. Allows users to design layouts using the BI Publisher Layout Editor.


  3. Grant BI Publisher system groups to global groups or users.

    You can grant BI Publisher system groups directly to users or through global groups.

Example 1: Grant Users the BI Publisher Administrator Role

  1. Under the Active Directory User and Computers, open the XMLP_ADMIN group and click the Members tab.

  2. Click Add to add users who need to BI Publisher Administrator privileges.

Example 2: Grant Users Access to Scheduling Reports

The "HR Manager" global group is defined under "Users".

All users in this group need to schedule reports.

To achieve this, add "HR Manager" as a Member of the XMLP_SCHEDULER group.

3.12.2 Configuring BI Publisher

To configure BI Publisher:

  1. On the Administration page, click Security Configuration.

  2. Set up a Local Superuser if one has not been configured. This is very important in case the security configuration fails, you must still be able to log in to BI Publisher using the Superuser credentials.

  3. In the Authorization region of the page, select LDAP from the Security Model list.

  4. Enter the details for the Active Directory server, as described in Section 3.11, "Configuring BI Publisher to Use an LDAP Provider," noting the following specific information for Active Directory:

    • Set Group Search Filter objectclass to "group"

    • Set Member of Group Member Attribute Name to "memberOf" (Group Member Attribute Name can be left blank).

    • Set Attribute used for Login Username to "sAMAccountName".

    • If your are using LDAP over SSL note the following:

      • the protocol is "ldaps"

      • the default port is 636

      An example URL would be: ldaps://example.com:636/

    Figure 3-7 shows an example configuration highlighting the recommendations stated above.

    Figure 3-7 Example Configuration

    Surrounding text describes Figure 3-7 .
  5. Click Apply. Restart the BI Publisher application.

If you are configuring BI Publisher to use LDAP over SSL, then you must also configure Java keystore to add the server certificate to JVM. For more information, see Section 4.3, "Configuring BI Publisher for Secure Socket Layer (SSL) Communication."

3.12.3 Logging In to BI Publisher Using the Active Directory Credentials

The User login name defined in Active Directory Users and Computers >User Properties >Account is used for the BI Publisher login name. Add the Domain to the user name to log in to BI Publisher. For example: "scott_tiger@domainname.com".

Note the following:

  • The Attribute used for Login Username can be sAMAccountName instead of userPrincipalName.

  • You must use sAMAccountName for the Attribute used for Login Username when the "User logon name (pre-Windows 2000)" is required to use for the BI Publisher login username.

  • User names must be unique across all organization units.

3.12.4 Assign Data Access and Catalog Permissions to Roles

To assign data access and catalog permissions to roles:

  1. Log in to BI Publisher as a user assigned the XMLP_ADMIN role in Active Directory.

  2. On the Administration page click Roles and Permissions.

    You see the roles that you created in Active Directory to which you assigned the XMLP_ roles. Note the following:

    • The XMLP_X roles are not shown because these are controlled through the Active Directory interface.

    • The Users tab is no longer available under the Security Center because users are now managed through Active Directory.

    • Roles are not updatable in the BI Publisher interface, except for adding data sources.

  3. Click Add Data Sources to add BI Publisher data sources to the role. A role must be assigned access to a data source to run reports from that data source or to build data models from the data source. For more information see Section 3.8.4, "Granting Data Access."

  4. Grant catalog permissions to roles. See Section 3.5, "About Catalog Permissions" and Section 3.8.3, "Granting Catalog Permissions" for details on granting catalog permissions to roles.

3.13 Configuring Single Sign-On

Integrating a single sign-on (SSO) solution enables a user to log on (sign-on) and be authenticated once per browser session. Thereafter, the authenticated user is given access to system components or resources according to the permissions and privileges granted to that user. Oracle BI Publisher can be configured to trust incoming HTTP requests that have been authenticated by a SSO solution that is configured for use with Oracle Fusion Middleware and Oracle WebLogic Server.

When BI Publisher is configured to use SSO authentication, it accepts authenticated users from whatever SSO solution Oracle Fusion Middleware is configured to use. If SSO is not enabled, then BI Publisher challenges each user for authentication credentials. When BI Publisher is configured to use SSO, a user is first redirected to the SSO solution's login page for authentication.

Configuring BI Publisher to work with SSO authentication requires minimally that the following be done:

See "Introduction to Single Sign-On in Oracle Fusion Middleware" in Oracle Fusion Middleware Application Security Guide.

Once you have configured your Single-Sign-On provider to protect Oracle BI Publisher, configure BI Publisher to trust incoming messages.

On the Administration page, under Security Center, click Security Configuration.

In the Single Sign-On region, select the User Single Sign-On check box.

Enter the fields appropriate for your SSO provider.

3.14 Configuring BI Publisher to Use Oracle Access Manager (OAM) Single Sign-On

BI Publisher can be configured to use Oracle Access Manager as the SSO provider.

Required components:

Directly after BI Publisher is installed, the embedded LDAP server in Oracle WebLogic Server is the default authentication source (identity store). The BI WebLogic domain must be configured to the new identity store, Oracle Internet Directory, as the main authentication source.

For more information about creating a new default authenticator in Oracle WebLogic Server, see the following Oracle Fusion Middleware guides:

After Oracle WebLogic Server has been configured, no further configuration is required in the BI Publisher application. Just ensure that Oracle Fusion Middleware is the selected security model in the Oracle BI Publisher Administration Security Configuration page as shown in the following figure:

Figure 3-8 Fusion Middleware Security Selection

Fusion Middleware Security authentication type

3.15 Setting Up Oracle Single Sign-On

To set up Oracle Single Sign-On, first configure WebLogic Server using the instructions in the chapter, "Configuring Single Sign-On in Oracle Fusion Middleware" in Oracle Fusion Middleware Application Security Guide. BI Publisher must be configured to use Oracle Internet Directory as the default LDAP server.

Note:

When using Oracle SSO, BI Publisher assumes that a login user name can be derived from Osso-User-Dn, which is HTTP Header value. For example, if the Osso-User-Dn on HTTP Header looks like this:

cn=admin,cn=users, dc=us,dc=oracle,dc=com

Then BI Publisher assumes the value of first cn= is the login user name (that is, "admin" in this case).

Therefore if your Osso-User-Dn does not contain a login user name as the first cn value, then select "Other SSO Type" to configure the settings (even if you use Oracle SSO).

3.15.1 Setup Procedure

To set up SSO:

  1. Modify the application server configuration file to protect the xmlpserver. See the section "Configuring mod_osso to Protect Web Resources" in Oracle Fusion Middleware Application Security Guide.

  2. In the mod_osso.conf add a new "Location" directive as follows:

    <!-- Protect xmlpserver -->
    <Location /xmlpserver>
          require valid-user
          AuthType Basic
    </Location>
    
    
  3. To allow Web service communication between BI Publisher and its client components (the Template Builder and the Excel Analyzer) you must make additional modifications to the mod_osso.conf file. To open up the xmlpserver to allow these Web services, enter the following directives:

    <Location /xmlpserver/services/>
      require valid-user
         AuthType Basic
         Allow from All
         Satisfy any
    </Location>
    
    <Location /xmlpserver/report_service/>
      require valid-user
         AuthType Basic
         Allow from All
         Satisfy any
    </Location>
    
    Location /xmlpserver/ReportTemplateService.xls/>
      require valid-user
         AuthType Basic
         Allow from All
         Satisfy any
    </Location>
    
    
    
  4. For integration with Oracle BI Presentation Services, you must disable SSO for Web services between the BI Presentation Services server and the BI Publisher server. If you made this entry when performing the previous step, then you do not need to repeat this setup.

    To open up the xmlpserver to allow the Web service, enter the following directive in the mod_osso.conf file:

    <Location /xmlpserver/services/>
     require valid-user
         AuthType Basic
         Allow from All
         Satisfy any
    </Location>
    

    A sample mod_osso.conf file with the entries discussed in this section is shown below:

    LoadModule osso_module libexec/mod_osso.so
     
     <IfModule mod_osso.c>
         OssoIpCheck off
         OssoIdleTimeout off
         OssoConfigFile /home/as1013/ohome/Apache/Apache/conf/osso/osso.conf
     
       <Location /xmlpserver>
         require valid-user
         AuthType Basic
       </Location>
     
     
    <Location /xmlpserver/services/>
      require valid-user
         AuthType Basic
         Allow from All
         Satisfy any
    </Location>
    
    <Location /xmlpserver/report_service/>
      require valid-user
         AuthType Basic
         Allow from All
         Satisfy any
    </Location>
    
    Location /xmlpserver/ReportTemplateService.xls/>
      require valid-user
         AuthType Basic
         Allow from All
         Satisfy any
    </Location>
    
    <Location /xmlpserver/Guest/>
     require valid-user
         AuthType Basic
         Allow from All
         Satisfy any
    </Location>
     #
     # Insert Protected Resources: (see Notes below for how to protect resources)
     #
     
     
     #______-
     #
     # Notes
     #
     #______-
     #
     # 1. Here's what you need to add to protect a resource,
     #    e.g. <ApacheServerRoot>/htdocs/private:
     #
     #      <Location /private>
     #      require valid-user
     #      AuthType Basic
     #      </Location>
     #
     </IfModule>
     
     #
     # If you would like to have short hostnames redirected to
     # fully qualified hostnames to allow clients that need 
     # authentication through mod_osso to be able to enter short
     # hostnames into their browsers uncomment out the following
     # lines
     #
     #PerlModule Apache::ShortHostnameRedirect
     #PerlHeaderParserHandler Apache::ShortHostnameRedirect
    
  5. Restart the HTTP server.

  6. In BI Publisher: Set up the Single Sign-Off URL on the BI Publisher Security Configuration page.

    On the Administration page, click Security Configuration. In the Authentication region:

    • Select Use Single Sign-On

    • From the Single Sign-On Type list, select Oracle Single Sign On

    • Enter the Single Sign-Off URL with the value you wrote down in the preceding step. The remaining fields are not applicable to Oracle SSO.

      A sample BI Publisher Security Configuration page is shown in Figure 3-9.

      Figure 3-9 Sample BI Publisher Security Configuration Page

      Surrounding text describes Figure 3-9 .
  7. Create a BI Publisher Local Superuser to ensure access to BI Publisher regardless of your selected security configuration. See Section 4.1, "Enabling a Local Superuser" for more information.

  8. Click Apply. Restart the application through the Oracle Fusion Middleware Control page.

  9. Enter the URL to access the BI Publisher Enterprise application, and you are redirected to the SSO login page.