Skip Headers
Oracle® Fusion Middleware Security Guide for Oracle Business Intelligence Applications
11
g
Release 1 (11.1.1.7)
Part Number E37986-01
Home
Book List
Index
Contact Us
Next
PDF
·
Mobi
·
ePub
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documentation
Conventions
What's New in This Guide
Notable Features in Oracle BI Applications Documented in This Guide
1
Integrating Security for Oracle BI Applications
1.1
Introduction
1.1.1
High Level Steps for Setting Up Security in Oracle BI Applications
1.1.2
What Tools Configure Security in Oracle Business Intelligence Applications?
1.1.3
What Security Levels Does Oracle BI Applications Use?
1.1.4
About Duty Roles in Oracle BI Applications
1.1.4.1
Viewing, Creating, and Editing Duty Roles
1.1.4.2
Authorizing User Access Using Roles
1.1.5
How to Define New Groups and Mappings for Users and BI Roles
1.1.5.1
How to Use Fusion Middleware to Provision an End User
1.1.5.2
How to Use a Repository Initialization Block to Provision an End User
1.1.6
Checking Oracle BI Applications User Responsibilities
1.1.7
About Managing Presentation Services Catalog Privileges in Oracle Business Intelligence
1.1.8
About Object-Level Security
1.1.8.1
Metadata Object-Level Security in the RPD
1.1.8.2
Metadata Object-Level Security in Presentation Services
1.1.9
About Data-Level Security
1.1.9.1
Overview of Data-Level Security in Oracle BI Applications
1.1.9.2
Implementing Data-Level Security in the Oracle BI Repository
1.1.9
Initialization Blocks Used for Data-Level Security in Oracle BI Applications
1.1.9
Data-Level Security Duty Roles in Oracle BI Applications
1.1.9.3
About Data-Level Security Design in Oracle BI Applications
1.1.10
About User-Level Security
1.1.11
Security Overview of Oracle BI Applications Configuration Manager and Functional Setup Manager
1.1.12
About Permissions in Configuration Manager and Functional Setup Manager
1.1.12.1
About Permissions in Configuration Manager
1.1.12.2
About Permissions in Functional Setup Manager
1.1.13
Additional Sources of Information About Oracle BI Applications Security
1.2
Extending Security in Oracle BI Applications
1.3
Using Oracle BI Applications Functional Setup Manager Informational Tasks to Set Up Security
Index