Index
A B C D E G H I J L M O P R S T U
A
- authorization process for Oracle EBS, 2.3.1
- authorization process for PeopleSoft, 2.4.1
B
- business group org-based security
-
- for Oracle EBS, 2.3.6
- for Oracle EBS, about, 2.3.6.1
- for Oracle EBS, implementing, 2.3.6.2
- Business Unit-Based security, 2.5.6
C
- CME Dashboards, 2.5.2.2
- CME Responsibilities, 2.5.2.2
- Communications, Media, and Energy Analytics
-
- security settings, 2.5.2.2, 2.5.2.2
- company org-based security
-
- PeopleSoft, 2.4.3
- PeopleSoft Financials, 2.4.3
- PeopleSoft HR, 2.4.3
D
- data security design, 2.1.9.5
- Data Security Groups
-
- about, 2.1.9.4
- list of, 2.1.9.4
- data warehouse tables
-
- data security design, 2.1.9.5
- data-level security
-
- about, 2.1.4
- authorization for Oracle EBS, 2.3.1
- authorization for PeopleSoft, 2.4.1
- detailed description, 2.1.9
- how to implement, 2.1.9.2
- initialization blocks for, 2.1.9.3
- integrating for Oracle EBS, 2.3
- integrating for PeopleSoft, 2.4
- integrating for Siebel CRM, 2.5
- overview, 2.1.9.1
E
- employee-based security
-
- for Oracle EBS, about, 2.3.9
- Oracle EBS, 2.3.9
- PeopleSoft, 2.4.10, 2.4.10
- extending BI Applications security model, 2.2
G
- groups
-
- using security group hierarchy, 2.1.5
- using security groups, 2.1.5
H
- Healthcare Analytics
-
- security settings, 2.5.2.3
- HR org-based security
-
- for Oracle EBS, 2.3.7
- for Oracle EBS, about, 2.3.7.1
- for Oracle EBS, how to implement, 2.3.7.2
- Oracle EBS, 2.3.7
- PeopleSoft, 2.4.5
- PeopleSoft HR, 2.4.5
- HR Personnel Data Analyst Security
-
- for PeopleSoft HR, 2.4.9
- HR Personnel Data Analyst security
-
- for Oracle EBS, 2.3.8
- HR personnel security
-
- Oracle EBS, 2.3.8
- PeopleSoft, 2.4.9
I
- initialization blocks
-
- data-level security, 2.1.9.3
- Insurance Analytics family of products
-
- security settings, 2.5.2.3
- inventory org-based security
-
- about, 2.3.3.1
- for Oracle EBS, 2.3.3, 2.3.4
- how to implement, 2.3.3.2
- Oracle EBS, 2.3.3
J
- JD Edwards
-
- how to check user responsibilities, 2.1.6
- integrating security, 2.6
- LDAP security, 2.6.1
- security integration, 2.6
- user and object security, 2.6.2
- using with LDAP, 2.6.1
L
- LDAP
-
- integration for user and object security, 2.6.3
- using with BE-EE and JD Edwards, 2.6.1
- ledger-based security
-
- for Oracle EBS, 2.3.5
- for Oracle EBS, about, 2.3.5.1
- for Oracle EBS, how to implement, 2.3.5.2
- Oracle EBS, 2.3.5
- PeopleSoft, 2.4.4
- PeopleSoft Financials, 2.4.4
M
- maintenance org-based security
-
- about, 2.3.4.1
- how to implement, 2.3.4.2
- Oracle EBS, 2.3.4
- metadata
-
- object level security, repository groups, 2.1.8
- object-level security, 2.1.8.2
- reloading, 2.1.7
- metadata object level security, 2.1.8.1
-
- repository groups, 2.1.8.1
O
- object-level security
-
- about, 2.1.4
- list of Repository Parent Groups, 2.1.8.1
- metadata, 2.1.8.1, 2.1.8.2
- Presentation Services objects, 2.1.8.2
- operating unit-based security
-
- for Oracle EBS, how to implement, 2.3.2.2
- Oracle EBS, 2.3.2.1
- PeopleSoft, 2.4.2
- operating unit-based security for Oracle EBS, 2.3.2
- Oracle BI
-
- Administration Tool, 2.1.2
- Presentation Services Administration, 2.1.2
- repository groups, 2.1.8
- Server metadata, reloading, 2.1.7
- Oracle BI EE
-
- using with LDAP, 2.6.1
- Oracle EBS
-
- about operating unit-based security, 2.3.2.1
- authorization process, 2.3.1
- business group org-based security, 2.3.6
- business group org-based security, about, 2.3.6.1
- employee-based security, about, 2.3.9
- how to implement inventory org-based security, 2.3.3.2
- how to implement ledger-based security, 2.3.5.2
- how to implement maintenance org-based security, 2.3.4.2
- how to implement operating unit-based security, 2.3.2.2
- HR org-based security, 2.3.7
- HR org-based security, about, 2.3.7.1
- HR org-based security, how to implement, 2.3.7.2
- HR Personnel Data Analyst security, 2.3.8
- implementing business group org-based security, 2.3.6.2
- integrating data security, 2.3
- inventory org-based security, 2.3.3, 2.3.4
- inventory org-based security, about, 2.3.3.1
- ledger-based security, 2.3.5
- ledger-based security, about, 2.3.5.1
- maintenance org-based security, about, 2.3.4.1
- operating unit-based security, 2.3.2
- Oracle Pharma Sales Analytics applications
-
- security settings, 2.5.2.4
- Oracle's Siebel Industry Applications
-
- CME security settings, 2.5.2.2
- consumer sector security settings, 2.5.2.1
- Oracle Pharma Sales Analytics security settings, 2.5.2.4
- Oracle's Siebel Financial Services security settings, 2.5.2.3
P
- Partner Analytics
-
- about security settings, 2.5.3
- payables org-based security
-
- PeopleSoft, 2.4.6
- PeopleSoft Financials, 2.4.6
- PeopleSoft
-
- authorization process for, 2.4.1
- employee-based security, 2.4.10
- PeopleSoft Enterprise Applications
-
- integrating security with, 2.4
- PeopleSoft Financials
-
- company org-based security, 2.4.3
- ledger-based security, 2.4.4
- payables org-based security, 2.4.6
- receivables org-based security, 2.4.7
- unit-based security for, 2.4.2
- PeopleSoft HR
-
- company org-based security, 2.4.3
- HR org-based security, 2.4.5
- HR Personnel Data Analyst Security, 2.4.9
- Pharma Sales Analytics
-
- security settings, 2.5.2.4
- policies
-
- list of supported data security policies, 2.1.9.1
- Primary Employee/Position Hierarchy-Based Security Group, 2.5.1.2
- Primary Owner-Based Security
-
- about, 2.5.5
- Primary Position-Based Security
-
- Siebel CRM, 2.5.1.1
- PRM Analytics
-
- data-level visibility, 2.5.3.5
- portal-based analytics dashboard mapping, 2.5.3.1
- subject area mapping, 2.5.3.3
- subject area visibility, 2.5.3.4
R
- receivables org-based security
-
- PeopleSoft, 2.4.7
- PeopleSoft Financials, 2.4.7
- reloading
-
- Oracle BI Server metadata, 2.1.7
- repository groups, 2.1.8.1
- Repository Parent Groups, 2.1.8.1
- Responsibilities and Dashboards
-
- for Usage Accelerator Analytics, 2.5.4
S
- security
-
- adding a user responsibility, 2.1.7
- Business Unit-Based, 2.5.6
- CME security settings, 2.5.2.2
- Communications, Media, and Energy Analytics, 2.5.2.2
- consumer sector security settings, 2.5.2.1
- Data Security Groups, 2.1.9.4
- data-level security, about, 2.1.9.1
- data-level security, implementing, 2.1.9.2
- employee/position based security, about, 2.5.1
- example security groups, 2.1.5
- for Usage Accelerator Analytics, 2.5.4
- groups, 2.1.5, 2.1.9.4
-
- Primary Employee/Position Hierarchy-Based, 2.5.1.2
- integrating data security with Oracle EBS, 2.3
- integrating data security with Oracle's PeopleSoft Enterprise Applications, 2.4
- integration with JD Edwards, 2.6
- metadata object level security (repository groups), about, 2.1.8, 2.1.8.1
- Oracle Financial Analytics settings, 2.5.2.3
- Oracle Pharma Sales Analytics security settings, 2.5.2.4
- Partner Analytics, 2.5.3, 2.5.3
- policies
-
- list of supported data security policies, 2.1.9.1
- Primary Owner-Based Security, 2.5.5
- primary position based security for CRM applications, about, 2.5.2
- process for extending model, 2.2
- security group hierarchy, 2.1.5
- security groups, 2.1.5
- tools for configuring, 2.1.2
- types
-
- data-level, 2.1.4
- object-level, 2.1.4
- user-level, 2.1.4
- types of security, about, 2.1
- Usage Accelerator Analytics, 2.5.4
- user responsibilities, checking, 2.1.6
- security groups
-
- examples, 2.1.5
- using, 2.1.5
- security model
-
- extending BI Applications security model, 2.2
- setID-based security
-
- PeopleSoft, 2.4.8
- PeopleSoft Financials, 2.4.8
- PeopleSoft HR, 2.4.8
- PeopleSoft HR and PeopleSoft Financials, 2.4.8
- Siebel CRM
-
- Primary Position-Based Security, 2.5.1.1
- Siebel CRM Applications
-
- integrating data security, 2.5
T
- tools
-
- for configuring security, 2.1.2
- Oracle BI Administration Tool, 2.1.2
- Oracle BI Presentation Services Administration, 2.1.2
U
- unit-based security
-
- for PeopleSoft Financials, 2.4.2
- Usage Accelerator Analytics
-
- Responsibilities and Dashboards, 2.5.4
- security settings, 2.5.4
- settings, 2.5.4
- user responsibilities
-
- how to add, 2.1.7
- how to check, 2.1.6, 2.1.6
- how to check in JD Edwards, 2.1.6
- registering new user, 2.1.7
- user-level security
-
- about, 2.1.4, 2.1.10
- how to set up, 2.1.10