Skip Headers
Oracle® Fusion Middleware User's Guide for Oracle Business Intelligence Data Warehouse Administration Console
11g Release 1 (11.1.1)

Part Number E14849-06
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

1 About DAC Security

This chapter provides information about the DAC security model, including an explanation about authentication and the recommended DAC security setup.

This chapter contains the following topics:

DAC Security Overview

Oracle Business Intelligence Data Warehouse Administration Console (DAC) comprises the following components:

When DAC runs in Fusion Middleware mode, users are defined in the WebLogic Server identity store (LDAP) and authenticated against a BI domain. The Fusion Middleware tier authenticates the users for access to the DAC repository. The LDAP credentials indicate: 1) whether the user is valid, and 2) the user's role. The DAC Client also accesses database credentials stored in an encrypted cwallet.sso file in the file system to access the DAC repository database. The database credentials are used to manipulate objects in the repository through direct JDBC access.

When DAC runs in DAC standalone authentication mode, the DAC Client authenticates users and gets user permissions against user credentials stored in the DAC repository.

DAC Client Installation Requirements

For production environments, in both Fusion Middleware and DAC standalone authentication deployment modes, the DAC Client has access to highly sensitive password information that allows connectivity to the DAC repository, to all of the data sources accessed by the BI Server (including the transactional data source), and to the data warehouse.

Therefore, for production environments, in both Fusion Middleware and DAC standalone authentication deployment modes, you must install the DAC Client according to the following requirements:

DAC Authentication in Oracle Fusion Middleware (WebLogic Server) Mode

Figure 1-1 illustrates the process of securing DAC when the DAC Server is running as a service on WebLogic Server.

Figure 1-1 DAC Server Running as Service on WebLogic Server

This graphic is described in the surrounding text.

This process is as follows:

  1. DAC Client logs in using FMW authentication:

    1. Gets user name and password from user (can be optionally saved on the file system).

    2. Reads the database connection information from the encrypted cwallet.sso file stored on the file system.

    3. Logs into the DAC repository.

    4. Reads the DAC Server URL from the DAC repository.

    5. Authenticates and gets permissions through the DAC Server in the BI domain using the BI domain URL.

  2. DAC Server reads the database connection information from the file system and connects to the DAC repository upon startup.

  3. Automation utilities read the database connection information from the file system and connect to the DAC repository.

    Note: The automation utilities are not interactive

  4. DAC Server command line utilities read the DAC Server information from the file system and send it as a Web service request, which is authenticated with proper user credentials.

DAC Authentication in Standalone Mode

Figure 1-2 illustrates the process of securing DAC when the DAC Server is running as a standalone JVM process.

Figure 1-2 DAC Server Running in Standalone Mode

This illustration is described in the surrounding text.

This process is as follows:

  1. DAC Client logs in using DAC authentication:

    1. Gets user name and password from user (can be optionally saved on the file system).

    2. Reads the database connection information from the encrypted cwallet.sso file stored on the file system.

    3. Logs into the DAC repository.

    4. Authenticates and gets permissions against user credentials stored in the DAC repository.

  2. DAC Server reads the database connection information from the file system and connects to the DAC repository upon startup.

  3. Automation utilities read the database connection information from the file system and connect to the DAC repository. Note: The automation utilities are not interactive.

  4. DAC Server command line utilities read the DAC Server information from the file system and send it as a Web service request, which is authenticated with proper user credentials.

Recommended DAC Security Setup

The recommended DAC security setup includes the following points: