[/map
{"- map/map "})
[/map/topicref
{"- map/topicref "}) [/map/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Configuring User-Related Settings (navtitle][/map/topicref/topicmeta/linktext
{"- map/linktext "}) Configuring User-Related Settings (linktext][/map/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) You configure settings for passwords and user authentication in the Studio Control Panel. (shortdesc] (topicmeta][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Configuring authentication settings for users (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Configuring authentication settings for users (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) Each user has both an email address and a screen name. By default, users log in to Studio using their email addresses. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Configuring the password policy (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Configuring the password policy (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) The password policy sets the requirements for creating and setting Studio passwords. These options do not apply to Studio passwords managed by an LDAP system. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Restricting the use of specific screen names and email addresses (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Restricting the use of specific screen names and email addresses (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) If needed, you can configure lists of screen names and email addresses that should not be used for Studio users. (shortdesc] (topicmeta] (topicref] (topicref]
[/map/topicref
{"- map/topicref "}) [/map/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Creating and Editing Studio Users (navtitle][/map/topicref/topicmeta/linktext
{"- map/linktext "}) Creating and Editing Studio Users (linktext][/map/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) In Studio, roles are used to control access to general features as well as to access specific projects and data. The Users page on the Control Panel provides options for creating and editing Studio users. (shortdesc] (topicmeta][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) About user roles and access privileges (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) About user roles and access privileges (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) Each Studio user is assigned a user role. The user role determines a user's access to features within Studio. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Creating a new Studio user (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Creating a new Studio user (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) If you are not using LDAP, you may want to create Studio users manually. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Editing a Studio user (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Editing a Studio user (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) The Users page also allows you to edit a user's account. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Deactivating, reactivating, and deleting Studio users (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Deactivating, reactivating, and deleting Studio users (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) From the Users page of the Control Panel, you can make an active user inactive. You can also reactivate or delete inactive users. (shortdesc] (topicmeta] (topicref] (topicref]
[/map/topicref
{"- map/topicref "}) [/map/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Integrating with an LDAP System to Manage Users (navtitle][/map/topicref/topicmeta/linktext
{"- map/linktext "}) Integrating with an LDAP System to Manage Users (linktext][/map/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) If you have an LDAP system, users can use their LDAP credentials to log in to Big Data Discovery. You can also configure BDD to communicate with the LDAP server over TLS/SSL. (shortdesc] (topicmeta][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) About using LDAP (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) About using LDAP (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) Integrating Studio with Lightweight Directory Access Protocol (LDAP) allows users to sign in to Studio using their existing LDAP user accounts, rather than creating separate user accounts from within Studio. LDAP is also used when integrating with a single sign-on (SSO) system. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Configuring the LDAP settings and server (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Configuring the LDAP settings and server (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) The LDAP settings on the page include whether LDAP is enabled and required for authentication, the connection to the LDAP server, and whether to support batch import or export to or from the LDAP directory. The method for processing batch imports is set in portal-ext.properties. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Authenticating against LDAP over TLS/SSL (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Authenticating against LDAP over TLS/SSL (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) To have Big Data Discovery Studio authenticate users against LDAP over TLS/SSL, export a certificate from your LDAP server and copy it to the cacerts keystore on the machine running Studio. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Preventing encrypted LDAP passwords from being stored in BDD (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Preventing encrypted LDAP passwords from being stored in BDD (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) By default, when you use LDAP for user authentication, each time a user logs in, Big Data Discovery stores a securely encrypted version of their LDAP password. For subsequent logins, Big Data Discovery can then authenticate the user even when it cannot connect to the LDAP system. For even stricter security, you can configure Big Data Discovery to prevent the passwords from being stored. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Assigning roles based on LDAP user groups (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Assigning roles based on LDAP user groups (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) For LDAP integration, it is recommended that you assign roles based on your LDAP groups. (shortdesc] (topicmeta] (topicref] (topicref]
[/map/topicref
{"- map/topicref "}) [/map/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Setting Up Single Sign-On (SSO) (navtitle][/map/topicref/topicmeta/linktext
{"- map/linktext "}) Setting Up Single Sign-On (SSO) (linktext][/map/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) You can provide user access by integrating with an SSO system. (shortdesc] (topicmeta][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) About using single sign-on (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) About using single sign-on (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) Integrating with single sign-on (SSO) allows Studio users to be logged in to Big Data Discovery automatically once they are logged in to your SSO system. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Overview of the process for configuring SSO with Oracle Access Manager (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Overview of the process for configuring SSO with Oracle Access Manager (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) Here is an overview of the steps for using Oracle Access Manager to implement SSO in Big Data Discovery. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Configuring the reverse proxy module in OHS (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Configuring the reverse proxy module in OHS (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) For WebLogic Server, you need to update the file mod_wl_ohs.conf to add the logout configuration for SSO. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Registering the Webgate with the Oracle Access Manager server (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Registering the Webgate with the Oracle Access Manager server (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) After you have installed the OHS Webgate, you use the remote registration (RREG) tool to register the OHS Webgate with the OAM server. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Testing the OHS URL (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Testing the OHS URL (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) Before continuing to the Big Data Discovery configuration, you need to test that the OHS URL redirects correctly to Big Data Discovery. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Configuring Big Data Discovery to integrate with SSO via Oracle Access Manager (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Configuring Big Data Discovery to integrate with SSO via Oracle Access Manager (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) In Big Data Discovery, you configure the LDAP connection and Oracle Access Manager connection settings. (shortdesc] (topicmeta][/map/topicref/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Configuring the LDAP connection for SSO (navtitle][/map/topicref/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Configuring the LDAP connection for SSO (linktext][/map/topicref/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) The SSO implementation uses LDAP to retrieve and maintain the user information. For the Oracle Access Manager SSO, you configure Big Data Discovery to use Oracle Internet Directory for LDAP. (shortdesc] (topicmeta] (topicref][/map/topicref/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Configuring the Oracle Access Manager SSO settings (navtitle][/map/topicref/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Configuring the Oracle Access Manager SSO settings (linktext][/map/topicref/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) After you configure the LDAP connection for your SSO integration, you configure the Oracle Access Manager SSO settings. (shortdesc] (topicmeta] (topicref] (topicref][/map/topicref/topicref
{"- map/topicref "}) [/map/topicref/topicref/topicmeta
{"- map/topicmeta "}) [/map/topicref/topicref/topicmeta/navtitle
{"- topic/navtitle "}) Completing and testing the SSO integration (navtitle][/map/topicref/topicref/topicmeta/linktext
{"- map/linktext "}) Completing and testing the SSO integration (linktext][/map/topicref/topicref/topicmeta/shortdesc
{"- map/shortdesc "}) The final step in setting up the SSO integration is to add the OHS server host name and port to portal-ext.properties. (shortdesc] (topicmeta] (topicref] (topicref]
(map]