Skip Headers
Oracle® Business Intelligence Applications Security Guide
Release 7.9.6.4
Part Number E35621-01
Home
Book List
Index
Contact Us
Next
PDF
·
Mobi
·
ePub
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
1
What's New in This Release
1.1
What's New in Oracle Business Intelligence Applications Security for Release 7.9.6.3
1.2
What's New in Oracle Business Intelligence Applications Security for Release 7.9.6.4
2
Integrating Security for Oracle BI Applications
2.1
Introduction
2.1.1
High Level Steps for Setting Up Security in Oracle BI Applications
2.1.2
What Tools Configure Security in Oracle Business Intelligence Applications?
2.1.3
About User GUIDs in Oracle Business Intelligence Enterprise Edition
2.1.4
What Security Levels Does Oracle BI Applications Use?
2.1.5
About Application Roles in Oracle BI Applications
2.1.5.1
Viewing, Creating, and Editing Application Roles
2.1.5.2
Authorizing User Access Using Roles
2.1.6
Checking Oracle BI Applications User Responsibilities
2.1.7
About Managing Presentation Services Catalog Privileges in Oracle Business Intelligence
2.1.8
About Object-Level Security
2.1.8.1
Metadata Object-Level Security in the RPD
2.1.8.2
Metadata Object-Level Security in Presentation Services
2.1.9
About Data-Level Security
2.1.9.1
Overview of Data-Level Security in Oracle BI Applications
2.1.9.2
Implementing Data-Level Security in the Oracle BI Repository
2.1.9.3
Initialization Blocks Used for Data-Level Security in Oracle BI Applications
2.1.9.4
Data-Level Security Application Roles in Oracle BI Applications
2.1.9.5
About Data-Level Security Design in Oracle BI Applications
2.1.10
About User-Level Security
2.2
Extending Security in Oracle BI Applications
2.3
Integrating Data Security for Oracle EBS
2.3.1
Oracle BI Applications Authorization for Oracle EBS
2.3.2
Operating Unit-Based Security for Oracle EBS
2.3.2.1
About Operating Unit-Based Security for Oracle EBS
2.3.2.2
Implementation Steps for Operating Unit-Based Security for Oracle EBS
2.3.3
Inventory Org-Based Security for Oracle EBS
2.3.3.1
About Inventory Org-Based Security for Oracle EBS
2.3.3.2
Implementation Steps for Inventory Org-Based Security for Oracle EBS
2.3.4
Maintenance Org-Based Security for Oracle EBS
2.3.4.1
About Maintenance Org-Based Security for Oracle EBS
2.3.4.2
Implementation Steps for Maintenance Org-Based Security for Oracle EBS
2.3.5
Ledger-Based Security for Oracle EBS
2.3.5.1
About Ledger-Based Security for Oracle EBS
2.3.5.2
Implementation Steps for Ledger-Based Security for Oracle EBS
2.3.6
Business Group Org-Based Security for Oracle EBS
2.3.6.1
About Business Group Org-Based Security for Oracle EBS
2.3.6.2
Implementation Steps for Business Group Org-Based Security for Oracle EBS
2.3.7
HR Org-Based Security for Oracle EBS
2.3.7.1
About HR Org-Based Security for Oracle EBS
2.3.7.2
Implementation Steps for HR Org-Based Security for Oracle EBS
2.3.8
Human Resource Personnel Data Analyst Security for Oracle EBS
2.3.9
Employee-Based Security for Oracle EBS
2.4
Integrating Data Security for Oracle's PeopleSoft Enterprise Applications
2.4.1
Oracle BI Applications Authorization for PeopleSoft
2.4.2
Operating Unit-Based Security for PeopleSoft Financials and PeopleSoft Procurement and Spend
2.4.3
Company Org-Based Security for PeopleSoft Financials and PeopleSoft HR
2.4.4
Ledger-Based Security for PeopleSoft Financials and PeopleSoft Procurement and Spend
2.4.5
HR Org-Based Security for PeopleSoft HR
2.4.6
Payables Org-Based Security for PeopleSoft Financials
2.4.7
Receivables Org-Based Security for PeopleSoft Financials
2.4.8
SetID-Based Security for PeopleSoft HR, PeopleSoft Financials, and PeopleSoft Procurement and Spend
2.4.9
Human Resource Personnel Data Analyst Security for PeopleSoft HR
2.4.10
Employee-Based Security for PeopleSoft
2.5
Integrating Data Security for Oracle's Siebel CRM Applications
2.5.1
About Primary Position-Based Security
2.5.1.1
Introduction
2.5.1.2
Primary Employee/Position Hierarchy-Based Application Role
2.5.1.3
Configuring Oracle BI Repository Table Joins for Primary Employee/Position Hierarchy-Based Security
2.5.2
About Primary Position-Based Security for Siebel CRM Industry Applications
2.5.2.1
Consumer Sector Analytics Security Settings
2.5.2.2
Communications, Media, and Energy (CME) Analytics Security Settings
2.5.2.3
Financial Services Analytics Security Settings
2.5.2.4
Pharma Sales Analytics and Pharma Marketing Analytics Security Settings
2.5.3
About Partner Analytics Security Settings
2.5.3.1
PRM Partner Portal Role-Based Interactive Dashboards Mapping
2.5.3.2
Partner Manager Role-Based Interactive Dashboards Mapping
2.5.3.3
PRM Analytics Subject Area Mappings
2.5.3.4
PRM Analytics Subject Area Visibility
2.5.3.5
PRM Analytics Data-Level Visibility
2.5.4
About Usage Accelerator Analytics Security Settings
2.5.5
About Primary Owner-Based Security
2.5.6
About Business Unit-Based Security
2.6
About Security Integration with Oracle's JD Edwards EnterpriseOne or JD Edwards World
2.6.1
How Oracle BI EE and JD Edwards EnterpriseOne Use LDAP
2.6.2
Integration of User and Object Security
2.6.3
Implementing LDAP Integration for User and Object Security
2.6.3.1
About Configuring Oracle Business Intelligence Enterprise Edition to Use LDAP
2.6.3.2
About Configuring JD Edwards EnterpriseOne to Use LDAP
2.6.3.3
About Configuring JD Edwards World to Use LDAP
Index