Skip Headers
Oracle® Fusion Middleware Reference Guide for Oracle Business Intelligence Applications
11g Release 1 (11.1.1)

Part Number E16816-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  B  C  D  E  F  G  H  I  J  M  N  O  P  R  S  T  U 

A

Administration Page in Oracle BI Presentation Catalog
tools, 2.2.4
aggregate tables
data warehouse tables, 4.2.1
Application Roles
example, 2.1.6.2
assignments for duty roles, 2.5
Authorization Policy Manager (APM)
tools, 2.2.2

B

backup and recovery, 5.4.1, 5.4.2

C

certification information, 1.2
configuration steps
Oracle BI Repository, 6
currency conversion, 4.10

D

dashboards
granting access to users, 2.3.1
data security design, 2.1.9.4
data warehouse languages
configuring base and installed languages, 3.1
data warehouse tables
aggregate tables, 4.2.1
data security design, 2.1.9.4
dimension class tables, 4.2.2
dimension tables, 4.2.3
fact tables, 4.2.5
helper tables, 4.2.6
hierarchy tables, 4.2.7
internal tables, 4.3
mini-dimension tables, 4.2.8
naming conventions, 4.1
primary data values, 4.8
staging tables, 4.2.9
standard column prefixes, 4.4
supported list of values, 4.9
system columns, 4.6
table types, 4.2
translation tables, 4.2.10
databases, supported, 1.2
data-level security
about, 2.1.3
initialization blocks for, 2.1.9.3
dimension class tables
data warehouse tables, 4.2.2
dimension tables
business role-based flags, 4.2.4
data warehouse tables, 4.2.3
duty role
create new, 2.3.4
creating, 2.3.4
duty role assignments, 2.5
duty roles
manage roles and privileges, 2.2.2
view role mapping using Authorization Policy Manager, 2.2.2
Duty Roles required to access Configuration Manager and FSM, 2.1.12

E

ETL process
requirements for running, 2.1.10
example Users, Groups, Application Roles, 2.1.6.2

F

fact tables
data warehouse tables, 4.2.5

G

granting access to dashboards, 2.3.1
Groups
example, 2.1.6.2

H

helper tables
data warehouse tables, 4.2.6
hierarchies
customizing Product Category Hierarchies, 6.4
hierarchy tables
data warehouse tables, 4.2.7

I

initialization blocks
data-level security, 2.1.9.3
internal tables, 4.3

J

job role
assign to duty role, 2.3.4
creating, 2.3.4

M

mapping duty roles
to secure BI Repository and BI Presentation Catalog objects, 2.5
memory requirements, 1.2
mini-dimension tables
data warehouse tables, 4.2.8
minimum disk space, 1.2
multi-language support
about BI Applications domains, 3.3
about dimension translation tables, 3.4
about pseudo-translations, 3.2
introduction, 3.1
translation tables, 3.1

N

naming conventions
data warehouse tables, 4.1

O

object-level security
about, 2.1.3
operating systems, supported, 1.2
Oracle BI Administration Tool
tools, 2.2.3
Oracle Identity Management
to manage users and enterprise roles, 2.2.1

P

patches
applying, 5.4
patching
content included in, 5.2
diagnosing whether applied correctly, 5.5
introducing, 5.1
properties file, 5.8
resolving conflicts, 5.7
rolling back if failed, 5.6
what is updated, 5.3
permissions
in DAC, Configuration Manager, FSM Manager, 2.1.13
platforms, supported, 1.2
Product Category Hierarchies
customizing, 6.4

R

recovery and backup, 5.4.1, 5.4.2
requirements, system, 1.2
role hierarchies, 2.3.2
role mapping
view using Authorization Policy Manager, 2.2.2

S

security
configuration tools summary, 2.2, 2.2
tools for configuring, 2.1.2
types
data-level, 2.1.3
object-level, 2.1.3
user-level, 2.1.3
types, about, 2.1.3
SSL
configuring for BI Applications, 2.4
staging tables
data warehouse tables, 4.2.9
standard column prefixes, 4.4
standard column suffixes, 4.5
supported installation types, 1.2
system columns, 4.6
multi-currency codes for, 4.7
system requirements, 1.2

T

table types
data warehouse tables, 4.2
tools
Administration Page in Oracle BI Presentation Catalog, 2.2.4
Authorization Policy Manager, 2.1.2
Authorization Policy Manager (APM), 2.2.2
for configuring security, 2.1.2
Oracle BI Administration Tool, 2.1.2, 2.2.3
Oracle BI Presentation Services Administration, 2.1.2
Oracle Identity Management, 2.1.2, 2.2.1
summary of configuration tools for security, 2.2, 2.2
using to configure Oracle BI Applications Security, 2.2
translation tables
data warehouse tables, 4.2.10

U

understanding, 2.3.2
user-level security
about, 2.1.3, 2.1.7
how to set up, 2.1.7
Users
example, 2.1.6.2
users, 2.3.1
assigning to job roles, 2.3.3
creating, 2.3.3