Skip Headers

Oracle Fusion Middleware Administrator's and Developer's Guide for Oracle Business Intelligence Publisher
Release 11g (11.1.1)
Part Number E13880-01
Go to Table of Contents
Contents
Go to previous page
Previous
Go to next page
Next

Configuring Oracle Fusion Middleware Security Model

This chapter covers the following topics:

Understanding the Security Model

The Oracle Fusion Middleware security model is built upon the Oracle Fusion Middleware platform, which incorporates the Java security model. The Java model is a role-based, declarative model that employs container-managed security where resources are protected by roles that are assigned to users. However, extensive knowledge of the Java-based architecture is unnecessary when using the Oracle Fusion Middleware Security model. When using this security model, BI Publisher can furnish uniform security and identity management across the enterprise.

After installation BI Publisher is automatically installed into a Oracle WebLogic Server domain, which is a logically related group of WebLogic Server resources that are managed as a unit. After a Simple installation type the WebLogic Server domain that is created is named bifoundation_domain. This name may vary depending upon the installation type performed. One instance of WebLogic Server in each domain is configured as an Administration Server. The Administration Server provides a central point for managing a WebLogic Server domain. The Administration Server hosts the Administration Console, which is a Web application accessible from any supported Web browser with network access to the Administration Server. BI Publisher is part of the active security realm configured for the Oracle WebLogic Server domain into which it is installed.

For more information about the Oracle Fusion Middleware platform and the common security framework, see Oracle Fusion Middleware Application Security Guide. For more information about managing the Oracle WebLogic Server domain and security realm, see Oracle Fusion Middleware Understanding Security for Oracle WebLogic Server and Oracle Fusion Middleware Securing Oracle WebLogic Server.

Key Security Elements

The Oracle Fusion Middleware security model depends upon the following key elements in order to provide uniform security and identity management across the enterprise:

Permission Grants and Inheritance

BI Publisher provides application-specific permissions for accessing different features. BI Publisher permissions are typically granted by becoming a member in an application role. Permissions can be granted two ways: through membership in an application role (direct) and through group and role hierarchies (inheritance). Application role membership can be inherited by nature of the application role hierarchy. In the default security configuration, each application role is preconfigured to grant a predefined set of permissions. Groups are mapped to an application role. The mapping of a group to a role conveys the role's permissions to all members of the group. In short, permissions are granted in BI Publisher by establishing the following relationships:

How a user’s permissions are determined by the system is as follows:

  1. A user enters credentials into a Web browser at login. The user credentials are authenticated by the authentication provider against data contained the identity store.

  2. After successful authentication, a Java subject and principal combination is issued, which is populated with the user name and a user's groups.

  3. A list of the user’s groups is generated and checked against the application roles. A list is created of the application roles that are mapped to each of the user's groups.

  4. A user's permission grants are determined from knowing which application roles the user is a member of. The list of groups is generated only to determine what roles a user has, and is not used for any other purpose.

A user can also be granted permissions if they inherit other application roles. Members of application roles can include other groups and application roles. The result is a hierarchical role structure where permissions can be inherited in addition to being explicitly granted. This hierarchy provides that a group is granted the permissions of the application role for which it is a member, and the permissions granted by all roles descended from that role.

For example, the default security configuration includes several predefined groups and application roles. The default BIAdministrator application role includes the BIAdministrators group, the BIAuthor application role includes the BIAuthors group, and the BIConsumer application role includes the BIConsumers group. The default BIAdministrator application role is a member the BIAuthor application role, and the BIAuthor application role is a member of the BIConsumer application role. The members of these application roles inherit permissions as follows. Members of the BIAdministrators group are granted all the permissions of the BIAdministrator role, the BIAuthor role, and the BIConsumer role. By nature of this role hierarchy, the user who is a member of a particular group is granted permissions both explicitly and through inheritance. For more information about the default application roles and groups, see Default Application Roles and Permissions.

Note: By themselves, groups and group hierarchies do not enable any privilege to access resources controlled by an application. Privileges are conveyed by the permission grants defined in an application policy. A user, group, or application role becomes a Grantee of the application policy. The application policy Grantee conveys the permissions and this is done by direct association (user) or by becoming a member of the Grantee (group or application role).

The following figure shows these relationships between the default groups and application roles.

the picture is described in the document text

The following table summarizes how permissions are granted explicitly or are inherited in the previous example and figure.

Permissions Granted by the Role Hierarchy Example
User Name Group Membership: Explicit/Inherited
Application Role Membership: Explicit/Inherited Permission Grants: Explicit/Inherited
User1, User2, User3 BIConsumers: Explicit BIConsumer: Explicit Permission A: Explicit
User4, User5 BIAuthors: Explicit
BIConsumers: Inherited
BIAuthor: Explicit
BIConsumer: Inherited
Permission B: Explicit
Permission A: Inherited
User6, User7 BIAdministrators: Explicit
BIAuthors: Inherited
BIConsumers: Inherited
BIAdministrator: Explicit
BIAuthor: Inherited
BIConsumer: Inherited
Permission C: Explicit
Permission B: Inherited
Permission A: Inherited

Default Security Configuration

Access control of system resources is achieved by requiring users to authenticate at login and by restricting users to only those resources for which they are authorized. A default security configuration is available for immediate use after BI Publisher is installed and is configured to use the Oracle Fusion Middleware security model. BI Publisher is installed into the Oracle WebLogic Server domain and uses its security realm. The default configuration includes three predefined security stores available for managing user identities, credentials, and BI Publisher-specific permission grants. Users can be added to predefined groups that are mapped to preconfigured application roles. Each application role is preconfigured to grant specific BI Publisher permissions.

The BI Publisher default security stores are configured as follows during installation.

Store Name Purpose Default Provider Options
Identity store
  • Used to control authentication.

  • Stores the users and groups, and the users group for Oracle WebLogic Server embedded directory server.

  • Oracle WebLogic Server embedded directory server.

  • Managed with Oracle WebLogic Server Administration Console.

BI Publisher can be reconfigured to use alternative authentication providers. For a complete list, see System Requirements and Supported Platforms for Oracle Fusion Middleware 11gR1.
Policy store
  • Used to control authorization.

  • Stores the application role definitions and the mapping definitions between groups and application roles.

  • system.jazn-data.xml file. Default installation location is MW_HOME/user_projects/domain/your_domain/config/fmwconfig

  • Managed with Oracle Enterprise Manager Fusion Middleware Control.

BI Publisher can be reconfigured to use Oracle Internet Directory as the policy store provider.
Credential store Stores the passwords and other security-related credentials either supplied or system-generated.
  • cwallet.sso file.

  • Managed using Fusion Middleware Control.

BI Publisher can be reconfigured to use Oracle Internet Directory as the credential store provider.

Default Users and Groups

The following table lists the default user names and passwords added to the BI Publisher identity store provider after installation. These defaults can be changed to different values and additional users can be added to the identity store by an administrative user using Oracle WebLogic Server Administration Console.

Default User Name and Password Purpose Description
Name: administrator user
Password: user supplied
Is the administrative user.
  • This user name is entered by the person performing the installation, it can be any desired name, and does not need to be named Administrator.

  • The password entered during installation can be changed later using the administration interface for the identity store provider.

  • This single administrative user is shared by BI Publisher and Oracle WebLogic Server. This user is automatically made a member of the Oracle WebLogic Server default Administrators group after installation. This enables this user to perform all Oracle WebLogic Server administration tasks, including the ability to manage Oracle WebLogic Server’s embedded directory server.

Name: BISystemUser
Password: system generated
  • A fixed user created during installation for trusted communication between components when using Oracle BI Analysis as a data source for your BI Publisher Data Model.

  • If you are integrating BI Publisher with Oracle Business Intelligence Enterprise Edition, the recommendation is to use this default user name for trusted communication with Oracle BI Presentation Services. This is the default configuration automatically configured during installation.

Important: This is a highly privileged user whose credentials should be protected from non-administrative users.

  • Using a separate trusted system account for secure inter-component communication enables you to change the password for the system administrator account without affecting communication between components.

  • The name of this user can be changed or a different user can be created for the purpose of inter-component communication.

The following table lists the default group names and group members added to the identity store provider during installation. These defaults can be changed to different values and additional group names can be added by an administrative user using Oracle WebLogic Server Administration Console.

Default Group Name and Members Purpose Description
Name: BIAdministrators
Members: Any administrator user
Contains the BI Publisher administrative users.
  • Members of the BIAdministrators group are granted administrative permissions because this group is mapped to the BIAdministrator application role at installation.

  • All users requiring administrative permissions should be added to the BIAdministrators group when using the default security configuration.

Name: BIAuthors
Members: BIAdministrators group
Contains the BI Publisher authors. Members of the BIAuthors group have the permissions necessary to create content for other users to use, or to consume.
Name: BIConsumers
Members: BIAuthors group and Oracle WebLogic Server LDAP server users group.
Contains the BI Publisher consumers.
  • Members of the BIConsumers group have the permissions necessary to use, or consume, content created by other users.

  • The BIConsumers group represents all users that have been authenticated by BI Publisher. By default, every authenticated user is automatically added to this group.

  • Oracle WebLogic Server LDAP server users group members have the permissions necessary to log in to and use Oracle WebLogic Server Administration Console.

Default Application Roles and Permissions

The following table lists the BI Publisher permissions and the application role that grants these permissions. This mapping exists in the default policy store.

Note: The following table lists the permissions explicitly granted by membership in the corresponding default application role. Permissions can also be inherited as a result of group and application role hierarchies. For more information about permission inheritance, see Permission Grants and Inheritance.

BI Publisher Permission Description Default Application Role Granting Permission Explicitly
oracle.bi.publisher.administerServer Enables the Administration link to access the Administration page and grants permission to set any of the system settings.

Important: See Granting the BIAdministrator Role Catalog Permissions for additional steps required to grant the BIAdministrator permissions on Shared Folders.

BIAdministrator
oracle.bi.publisher.developDataModel Grants permission to create or edit data models. BIAuthor
oracle.bi.publisher.developReport Grants permission to create or edit reports, style templates, and sub templates. This permission also enables connection to the BI Publisher server from the Template Builder. BIAuthor
oracle.bi.publisher.runReportOnline Grants permission to open (execute) reports and view the generated document in the report viewer. BIConsumer
oracle.bi.publisher.scheduleReport Grants permission to create or edit jobs and also to manage and browse jobs. BIConsumer
oracle.bi.publisher.accessReportOutput Grants permission to browse and manage job history and output. BIConsumer
oracle.bi.publisher.accessExcelReportAnalyzer Grants permission to download the Analyzer for Excel and to download data from a report to Excel using the Analyzer for Excel. Note that to enable a user to upload an Analyzer for Excel template back to the report definition, the permission oracle.bi.publisher.developReport must also be granted. BIConsumer
oracle.bi.publisher.accessOnlineReportAnalyzer Grants permission to launch the Analyzer and manipulate the data. Note that to save an Analyzer template to a report definition, the permission oracle.bi.publisher.developReport must also be granted. BIConsumer
BIConsumer permissions granted implicitly The authenticated role is a member of the BIConsumer role by default and, as such, all authenticated role members are granted the permissions of the BIConsumer role implicitly. Authenticated Role

The authenticated role is a special application role provided by the Oracle Fusion Middleware security model and is made available to any application deploying this security model. BI Publisher uses the authenticated application role to grant permissions implicitly derived by the role and group hierarchy of which the authenticated role is a member. The authenticated role is a member of the BIConsumer role by default and, as such, all authenticated role members are granted the permissions of the BIConsumer role implicitly. By default, every authenticated user is automatically added to the BIConsumers group. The authenticated role is not stored in the obi application stripe and is not searchable in the BI Publisher policy store. However, the authenticated role will appear in the administrative interface for the policy store, is available in application role lists, and can be added as a member of another application role. You can map the authenticated role to another user, group, or application role, but you cannot remove the authenticated role itself. Removal of the authenticated role would result in the inability to log into the system and this right would need to be granted explicitly.

For more information about the Oracle Fusion Middleware security model and the authenticated role, see Oracle Fusion Middleware Application Security Guide.

Granting the BIAdministrator Role Catalog Permissions

The BIAdministrator role is granted only Read permissions on the catalog by default. This means that before a BIAdministrator can manage Shared Folders the BIAdministrator role must grant to the BIAdministrator role Write and Delete permissions on the Shared Folders node. See Granting Catalog Permissions for a detailed description of granting permissions in the catalog.

Managing Authentication

Authentication is the process of verifying identity by confirming the user is who she claims to be. Oracle WebLogic Server embedded directory server is the authentication provider for the default security configuration. Users, groups, and passwords are managed using Oracle WebLogic Server Administration Console. It is fine to use the default authentication provider for a development or test environment. In a production environment, best practice is to use a full featured authentication provider.

Note: Refer to the system requirements and certification documentation for information about hardware and software requirements, platforms, databases, and other information. These documents are available on Oracle Technology Network (OTN).

During installation an Oracle WebLogic Server domain is created. BI Publisher is installed into that domain and uses the Oracle WebLogic Server security realm. The security realm can have multiple authentication providers configured but only one provider can be active at a time. The order of providers in the list determines priority. The effect of having multiple authentication providers defined in a security realm is not cumulative; rather, the first provider in list is the source for all user and password data needed during authentication. This enables you to switch between authentication providers as needed. For example, if you have separate LDAP servers for your development and production environments, you can change which directory server is used for authentication by re-ordering them in the Administration Console. For information about how to configure a different authentication provider, see Configuring a New Authentication Provider.

Detailed information about managing an authentication provider in Oracle WebLogic Server is available in its online help. For more information, log in to Oracle WebLogic Server Administration Console and launch Oracle Fusion Middleware Oracle WebLogic Server Administration Console Online Help.

Accessing Oracle WebLogic Server Administration Console

Oracle WebLogic Server is automatically installed and serves as the default administration server. The Administration Console is browser-based and is used to manage the embedded directory server that is configured as the default authenticator. It is launched by entering its URL into a web browser. The default URL takes the following form: http://hostname:port_number/console. The port number is the number of the administration server. By default, the port number is 7001.

To launch the Oracle WebLogic Server Administration Console:

  1. Log into Oracle WebLogic Server by entering its URL into a Web browser.

    For example, http://hostname:7001/console. The Administration Console login page displays.

    the picture is described in the document text

  2. Log in using the BI Publisher administrative user and password and click Login.

    The password is the one you supplied during the installation of BI Publisher. If these values have been changed, then use the current administrative user name and password combination.

    The Administration Console displays.

    the picture is described in the document text

Managing Users and Groups Using the Default Authentication Provider

Managing a group is more efficient than managing a large number of users individually. Best practice is to first organize all BI Publisher users into groups that have similar system access requirements. These groups can then be mapped to application roles that provide the correct level of access. If system access requirements change, then you need only modify the permissions granted by the application roles, or create a new application roles with appropriate permissions. Once your groups are established, continue to add or remove users directly in the identity store using its administration interface as you normally would.

To create a user in the default directory server:

  1. If needed, launch Oracle WebLogic Server Administration Console.

    For more information, see Accessing Oracle WebLogic Server Administration Console

  2. Log in as an administrative user.

  3. In the Administration Console, select Security Realms from the left pane and click the realm you are configuring. For example, myrealm.

  4. Select Users and Groups tab, then Users. Click New.

    the picture is described in the document text

  5. In the Create a New User page provide the following information:

    the picture is described in the document text

  6. Click OK.

    The user name is added to the User table.

To create a group in the default directory server:

  1. If needed, launch Oracle WebLogic Server Administration Console.

    For more information, see Accessing Oracle WebLogic Server Administration Console.

  2. Log in as an administrative user.

  3. In the Administration Console, select Security Realm from the left pane and click the realm you are configuring. For example, myrealm.

  4. Select Users and Groups tab, then Groups. Click New.

  5. In the Create a New Group page provide the following information:

  6. Click OK.

    The group name is added to the Group table.

To add a user to a group in the default directory server:

  1. If needed, launch Oracle WebLogic Server Administration Console.

    For more information, see Accessing Oracle WebLogic Server Administration Console.

  2. Log in as an administrative user.

  3. In the Administration Console, select Security Realm from the left pane and click the realm you are configuring. For example, myrealm.

  4. Select Users and Groups tab, then Users. Select the user from Name.

    the picture is described in the document text

  5. From the Settings page, select the Groups tab to display the list of available groups.

  6. Select one or more groups from the Available list and use the shuttle controls to move them to the Chosen list.

    the picture is described in the document text

  7. Click Save.

    The user is added to the group.

To change a user password in the default directory server:

  1. If needed, launch Oracle WebLogic Server Administration Console.

    For more information, see Accessing Oracle WebLogic Server Administration Console.

  2. Log in as an administrative user.

  3. In the Administration Console, select Security Realms from the left pane and click the realm you are configuring. For example, myrealm.

  4. Select Users and Groups tab, then Users.

  5. In the Users table select the user you want to change the password for.

    The settings page for the user displays.

    the picture is described in the document text

  6. Select the Passwords tab and enter the password in the New Password and Confirm Password fields.

  7. Click Save.

Managing Authorization

After a user is authenticated, further access to BI Publisher resources is controlled by the granting of permissions, also known as authorization. The policy store contains the system and application-specific policies and roles required for BI Publisher. A policy store can be file-based or LDAP-based and holds the mapping definitions between the default BI Publisher application roles, permissions, users and groups. BI Publisher permissions are granted by mapping users and groups from the identity store to application roles and permission grants located in the policy store. These mapping definitions between users and groups (identity store) and the application roles (policy store) are also kept in the policy store.

Important: Best practice is to map groups instead of individual users to application roles. Controlling membership in a group reduces the complexity of tracking access rights for multiple individual users. Group membership is controlled in the identity store.

The system-jazn-data.xml file is installed and configured as the default policy store. You can continue to use the default store and modify it as needed for your environment, or you can migrate its data to an LDAP-based provider. Oracle Internet Directory is the supported LDAP server in this release.

The policy store and credential store must be of the same type in your environment. That is, both must be either file-based or LDAP-based.

Permissions must be defined in a manner that BI Publisher understands. All valid BI Publisher permissions are premapped to application policies, which are in turn premapped to the default application roles. You cannot create new permissions in the policy store. However, you can customize the default application policy permission grants and application role mappings as well as create your own.

For more information about the default BI Publisher permissions grants, see Default Application Roles and Permissions.. For more information about customizing application roles and permission grants, see Customizing the Policy Store

Accessing Oracle Enterprise Manager Fusion Middleware Control

Fusion Middleware Control is a Web browser-based, graphical user interface that you can use to monitor and administer a farm. A farm is a collection of components managed by Fusion Middleware Control. It can contain Oracle WebLogic Server domains, one Administration Server, one or more Managed Servers, clusters, and the Oracle Fusion Middleware components that are installed, configured, and running in the domain. During installation an Oracle WebLogic domain is created and BI Publisher is installed into that domain. If you performed a Simple or Enterprise installation type, this domain is named bifoundation_domain and is located within the WebLogic Domain in the Fusion Middleware Control target navigation pane.

Launch Fusion Middleware Control by entering its URL into a Web browser. The URL includes the name of the host and the administration port number assigned during the installation. This URL takes the following form: http://hostname:port_number/em. The default port is 7001. For more information about using Fusion Middleware Control, see Oracle Fusion Middleware Administrator's Guide.

To display the Security menu in Fusion Middleware Control:

  1. Log into Oracle Enterprise Manager Fusion Middleware Control by entering the URL in a Web browser.

    For example, http://hostname:7001/em.

    The Fusion Middleware Control login page displays.

    the picture is described in the document text

  2. Enter the BI Publisher administrative user name and password and click Login.

    The password is the one you supplied during the installation of BI Publisher. If these values have been changed, then use the current administrative user name and password combination.

  3. From the target navigation pane, open WebLogic Domain to display bifoundation_domain. Display the Security menu by selecting one of the following methods:

Managing the Policy Store Using Fusion Middleware Control

Use Fusion Middleware Control to manage the BI Publisher application policies and application roles maintained in the policy store whether it is file-based or LDAP-based. For more information about configuring an LDAP-based policy store, see Configuring a New Policy Store and Credential Store Provider.

Caution: Oracle recommends you make a copy of the original system-jazn-data.xml policy file and place it in a safe location. Use the copy of the original file to restore the default policy store configuration, if needed. Changes to the default security configuration may lead to an unwanted state. The default installation location is MW_HOME/user_projects/domain/your_domain/config/fmwconfig.

The following are common policy store management tasks:

Modifying Application Roles Using Fusion Middleware Control

Members can be added or deleted from an application role using Fusion Middleware Control. You must perform these tasks while in the WebLogic Domain that BI Publisher is installed in. For example, bifoundation_domain.

Caution: Be very careful when changing the permission grants and membership for the default application roles. Changes could result in an unusable system.

Modifying Membership in an Application Role

Valid members of an application role are users, groups, or other application roles. The process of becoming a member of an application role is called mapping. That is, being mapped to an application role is to become a member of an application role. Best practice is to map groups instead of individual users to application roles for easier maintenance.

To add or remove members from an application role:

  1. Log into Fusion Middleware Control, navigate to Security, then select Application Roles to display the Application Roles page.

    For information about navigating to the Security menu, see Accessing Oracle Enterprise Manager Fusion Middleware Control.

  2. Choose Select Application Stripe to Search, then select the obi from the list. Click the search icon next to Role Name.

    the picture is described in the document text

    The BI Publisher application roles are displayed. In the following figure the default application roles are shown.

    the picture is described in the document text

  3. Select the cell next to the application role name and click Edit to display the Edit Application Role page. In the following figure the BIAuthor application role has been selected.

    the picture is described in the document text

    You can add or delete members from the Edit Application Role page. Valid members are application roles, groups, and users.

  4. Select from the following options:

  5. If adding a member, complete Search and select from the available list. Use the shuttle controls to move the member to the selected field. Click OK.

    For example, the following figure shows the Add Group dialog and after the Report_Dev group has been selected.

    the picture is described in the document text

    The added member displays in the Members column corresponding to the application role modified in the Application Roles page.

Managing Credentials

Credentials used by the system are stored in a single secure credential store. Oracle Wallet is the default credential store file (cwallet.sso). The credential store alternatively can be LDAP-based and Oracle Internet Directory is the supported LDAP server in this release. LDAP-based credential stores are configured and administered using Oracle Enterprise Manager Fusion Middleware Control or WLST commands.

Each credential is uniquely identified by a map name and a key name. Each map contains a series of keys and each key is a credential. The combination of map name and key name must be unique for all credential store entries. The following credential maps are used by BI Publisher:

The following two credential types are supported:

To facilitate getting started with your development environment, default credentials are inserted into the file-based credential store during installation. Be aware that BI Publisher credentials such as user passwords are stored in the identity store and managed with its corresponding administrative interface.

Managing the Credential Store

Credentials can be managed either in Fusion Middleware Control or using WLST command. For more information about both methods, see "Managing the Domain Credential Store" in Oracle Fusion Middleware Application Security Guide.

Managing BISystemUser Credentials

If using Oracle Business Intelligence as a data store, BI Publisher establishes system communication with it as BISystemUser. If you change the BISystemUser password in the identity store administrative interface, you also must change the password in the credential store (oracle.bi.system credential map). This applies if you have created a custom application role to take the place of the default BISystemUser. Components will be unable to communicate with each other if the credentials are out-of-sync. For more information about how Oracle Business Intelligence uses BISystemUser for trusted system communication, see Oracle Fusion Middleware Security Guide for Oracle Business Intelligence Enterprise Edition.

Customizing the Default Security Configuration

You can customize the default security configuration in the following ways:

Configuring a New Authentication Provider

You can configure another supported LDAP server to be the authentication provider. Configuring BI Publisher to use an alternative external identity store is performed using the Oracle WebLogic Server Administration Console. BI Publisher delegates authentication and user population management to the authentication provider and identity store configured for the domain it is a part of. For example, if configured to use Oracle WebLogic Server’s default authentication provider, then management is performed in the Oracle WebLogic Server Administration Console. If configured to use Oracle Internet Directory (OID), then the OID management user interface is used, and so on.

If using an authentication provider other than the one installed as part of the default security configuration, the default users and groups discussed in Default Users and Groups will not be automatically present. You can create users and groups with names of your own choosing or re-create the default user and group names if the authentication provider supports this. After this work is completed, you must map the default BI Publisher application roles to different groups again. For example, if your corporate LDAP server is being used as the identity store and you are unable to re-create the BI Publisher default users and groups in it, you will need to map the default application roles to different groups specific to the corporate LDAP server. Use Fusion Middleware Control to map the groups to application roles.

For information about how to configure a different authentication provider, see Oracle Fusion Middleware Oracle WebLogic Server Administration Console Online Help and Oracle Fusion Middleware Securing Oracle WebLogic Server.

Configuring a New Policy Store and Credential Store Provider

The policy store and credential store can be file-based or LDAP-based. The supported LDAP server for both stores in this release is Oracle Internet Directory. The pre-requisites for using an LDAP-based store are the same as for both the policy store and credential store. For more information, see "Configuring a Domain to Use an LDAP-Based Policy Store" in Oracle Fusion Middleware Application Security Guide.

Reassociating the Policy Store and Credential Store

Migrating policies and credentials from one security store to another is called reassociation. Both policy store and credential store data can be reassociated (migrated) from a file-based store to an LDAP-based store, or from an LDAP-based store to another LDAP-based store

Since the credential store and the policy store must both be of the same type, when reassociating one store you must reassociate the other.

For more information about reassociation and the steps required to migrate credential store and policy store data to Oracle Internet Directory, see "Reassociating Domain Stores with Fusion Middleware Control" in Oracle Fusion Middleware Application Security Guide.

Customizing the Policy Store

The Fusion Middleware Security model can be customized for your environment by creating your own application policies and application roles. Existing application roles can be modified by adding or removing members as needed. Existing application policies can be modified by adding or removing permission grants. For more information about managing application policies and application roles, see Oracle Fusion Middleware Application Security Guide.

Important: Before creating a new application policy or application role and adding it to the default BI Publisher security configuration, familiarize yourself with how permission and group inheritance works. It is important when constructing a role hierarchy that circular dependencies are not introduced. Best practice is to leave the default security configuration in place and first incorporate your customized application policies and application roles in a test environment. For more information, see Permission Grants and Inheritance.

Creating Application Roles Using Fusion Middleware Control

There are two methods for creating a new application role:

To create a new application role:

  1. Log into Fusion Middleware Control, navigate to Security, then select Application Roles to display the Application Roles page.

    For information, see Accessing Oracle Enterprise Manager Fusion Middleware Control.

  2. Choose Select Application Stripe to Search, then select obi from the list. Click the search icon next to Role Name.

    The BI Publisher application roles display.

  3. Click Create to display the Create Application Role page. You can enter all information at once or you can enter a Role Name, save it, and complete the remaining fields later. Complete the fields as follows:

    In the General section:

    In the Members section, select the users, groups, or application roles to be mapped to the application role, Select Add Application Role or Add Group or Add Users accordingly. To search in the dialog box that displays:

  4. Click OK to return to the Application Roles page.

    The application role just created displays in the table at the bottom of the page.

To create an application role based on an existing one:

  1. Log into Fusion Middleware Control, navigate to Security, then select Application Roles to display the Application Roles page.

    For information, see Accessing Oracle Enterprise Manager Fusion Middleware Control.

  2. Choose Select Application Stripe to Search, then select the obi from the list. Click the search icon next to Role Name.

    The BI Publisher application roles display.

  3. Select an application role from the list to enable the action buttons.

  4. Click Create Like to display the Create Application Role Like page.

    The Members section is completed with the same application roles, groups, or users that are mapped to the original role.

  5. Complete the Role Name, Display Name, and Description fields.

    The following figure shows an application role based upon BIAuthor after being named MyNewRole, as an example.

    the picture is described in the document text

  6. Use Add and Delete to modify the members as appropriate and click OK.

    The just created application role displays in the table at the bottom of the page. The following figure shows the example MyNewRole that is based upon the default BIAuthor application role.

    the picture is described in the document text

Creating Application Policies Using Fusion Middleware Control

All BI Publisher permissions are provided and you cannot create new permissions. Permission grants are controlled in the Fusion Middleware Control Application Policies page. The permission grants are defined in an application policy. An application role, user, or group, is then mapped to an application policy. This process makes the application role, user, or group a Grantee of the application policy.

There are two methods for creating a new application policy:

To create a new application policy:

  1. Log into Fusion Middleware Control, navigate to Security, then select Application Policies to display the Application Policies page.

    For information, see Accessing Oracle Enterprise Manager Fusion Middleware Control.

  2. Choose Select Application Stripe to Search, then select the obi from the list. Click the search icon next to Permission.

    The BI Publisher application policies are displayed. The Principal column displays the name of the policy Grantee.

  3. Click Create to display the Create Application Grant page.

  4. To add permissions to the policy being created, click Add in the Permissions area to display the Add Permission dialog.

    You are returned to the Create Application Grant page. The selected permissions display in the Permissions area.

  5. To add an application role to the policy being created, click Add Application Role in the Grantee area to display the Add Application Role dialog.

    You are returned to the Application Policies page. The Principal (Grantee) and Permissions of the policy just created are displayed in the table.

To create an application policy based on an existing one:

  1. Log into Fusion Middleware Control navigate to Security, then select Application Policies to display the Application Policies page.

    For information, see Accessing Oracle Enterprise Manager Fusion Middleware Control.

  2. Choose Select Application Stripe to Search, then select obi from the list. Click the search icon next to Permission.

    The BI Publisher application policies are displayed. The Principal column displays the name of the policy Grantee.

  3. Select an existing policy from the table.

    For example, the following figure shows the BIAuthor Principal (Grantee) selected and the Create Like button activated.

    the picture is described in the document text

  4. Click Create Like to display the Create Application Grant Like page. The Permissions table displays the names of the permissions granted by the policy selected.

  5. To remove any items, select it and click Delete.

  6. To add application roles to the policy, click Add Application Role in the Grantee area to display the Add Application Role dialog.

    The following figures use the MyNewRole application role as an example.

You are returned to the Application Policies page. The Principal and Permissions of the policy created are displayed in the table.

the picture is described in the document text

Changing Permission Grants for an Application Policy

You can change one or more permissions granted by an application policy.

To add or remove permission grants from an application policy:

  1. Log into Fusion Middleware Control, navigate to Security, then select Application Policies to display the Application Policies page.

    For information, see Accessing Oracle Enterprise Manager Fusion Middleware Control.

  2. Choose Select Application Stripe to Search, then select obi from the list. Click the search icon next to Role Name.

    The BI Publisher application policies are displayed. The Principal column displays the name of the policy Grantee.

  3. Select the name of the application role from the Principal column and click Edit.

  4. Add or delete permissions from the Edit Application Grant view and click OK to save the changes.

For additional information, see "Managing Application Policies" in Oracle Fusion Middleware Application Security Guide.