Skip Headers
Oracle® Business Intelligence Applications Security Guide
Release 7.9.6.3
Part Number E19042-01
Home
Book List
Index
Contact Us
Next
PDF
·
Mobi
·
ePub
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
1
What's New in This Release
1.1
What's New in Oracle Business Intelligence Applications Security for Release 7.9.6.3
2
Integrating Security for Oracle BI Applications
2.1
About Security in Oracle BI Applications
2.1.1
About Security Integration Between Oracle Business Enterprise Edition and Oracle BI Applications
2.1.1.1
About User GUIDs in Oracle Business Intelligence Enterprise Edition
2.1.2
About Oracle BI Applications Security Levels
2.1.3
Using Application Roles in Oracle BI Applications
2.1.4
Checking Oracle BI Applications User Responsibilities
2.1.5
About Managing Presentation Services Catalog Privileges in Oracle Business Intelligence
2.2
Data-Level Security in Oracle BI Applications
2.2.1
Overview of Data-Level Security in Oracle BI Applications
2.2.2
Implementing Data-Level Security in the Oracle BI Repository
2.2.3
Initialization Blocks Used for Data-Level Security in Oracle BI Applications
2.2.4
Data-Level Security Application Roles in Oracle BI Applications
2.2.5
About Data-Level Security Design in Oracle BI Applications
2.3
Object-Level Security in Oracle BI Applications
2.3.1
Metadata Object-Level Security in the RPD
2.3.2
Metadata Object-Level Security in Presentation Services
2.4
User-Level Security in Oracle BI Applications
2.5
Extending Security in Oracle BI Applications
2.6
Integrating Data Security for Oracle EBS
2.6.1
Oracle BI Applications Authorization for Oracle EBS
2.6.2
Operating Unit-Based Security for Oracle EBS
2.6.2.1
About Operating Unit-Based Security for Oracle EBS
2.6.2.2
Implementation Steps for Operating Unit-Based Security for Oracle EBS
2.6.3
Inventory Org-Based Security for Oracle EBS
2.6.3.1
About Inventory Org-Based Security for Oracle EBS
2.6.3.2
Implementation Steps for Inventory Org-Based Security for Oracle EBS
2.6.4
Ledger-Based Security for Oracle EBS
2.6.4.1
About Ledger-Based Security for Oracle EBS
2.6.4.2
Implementation Steps for Ledger-Based Security for Oracle EBS
2.6.5
Business Group Org-Based Security for Oracle EBS
2.6.5.1
About Business Group Org-Based Security for Oracle EBS
2.6.5.2
Implementation Steps for Business Group Org-Based Security for Oracle EBS
2.6.6
HR Org-Based Security for Oracle EBS
2.6.6.1
About HR Org-Based Security for Oracle EBS
2.6.6.2
Implementation Steps for HR Org-Based Security for Oracle EBS
2.6.7
Human Resource Personnel Data Analyst Security for Oracle EBS
2.6.8
Employee-Based Security for Oracle EBS
2.7
Integrating Data Security for Oracle's PeopleSoft Enterprise Applications
2.7.1
Oracle BI Applications Authorization for PeopleSoft
2.7.2
Operating Unit-Based Security for PeopleSoft Financials and PeopleSoft Procurement and Spend
2.7.3
Company Org-Based Security for PeopleSoft Financials and PeopleSoft HR
2.7.4
Ledger-Based Security for PeopleSoft Financials and PeopleSoft Procurement and Spend
2.7.5
HR Org-Based Security for PeopleSoft HR
2.7.6
Payables Org-Based Security for PeopleSoft Financials
2.7.7
Receivables Org-Based Security for PeopleSoft Financials
2.7.8
SetID-Based Security for PeopleSoft HR, PeopleSoft Financials, and PeopleSoft Procurement and Spend
2.7.9
Human Resource Personnel Data Analyst Security for PeopleSoft HR
2.7.10
Employee-Based Security for PeopleSoft
2.8
Integrating Data Security for Oracle's Siebel CRM Applications
2.8.1
About Primary Position-Based Security
2.8.1.1
Introduction
2.8.1.2
Primary Employee/Position Hierarchy-Based Application Role
2.8.1.3
Configuring Oracle BI Repository Table Joins for Primary Employee/Position Hierarchy-Based Security
2.8.2
About Primary Position-Based Security for Siebel CRM Industry Applications
2.8.2.1
Consumer Sector Analytics Security Settings
2.8.2.2
Communications, Media, and Energy (CME) Analytics Security Settings
2.8.2.3
Financial Services Analytics Security Settings
2.8.2.4
Pharma Sales Analytics and Pharma Marketing Analytics Security Settings
2.8.3
About Partner Analytics Security Settings
2.8.3.1
PRM Partner Portal Role-Based Interactive Dashboards Mapping
2.8.3.2
Partner Manager Role-Based Interactive Dashboards Mapping
2.8.3.3
PRM Analytics Subject Area Mappings
2.8.3.4
PRM Analytics Subject Area Visibility
2.8.3.5
PRM Analytics Data-Level Visibility
2.8.4
About Usage Accelerator Analytics Security Settings
2.8.5
About Primary Owner-Based Security
2.8.6
About Business Unit-Based Security
2.9
About Security Integration with Oracle's JD Edwards EnterpriseOne or JD Edwards World
2.9.1
How Oracle BI EE and JD Edwards EnterpriseOne Use LDAP
2.9.2
Integration of User and Object Security
2.9.3
Implementing LDAP Integration for User and Object Security
2.9.3.1
About Configuring Oracle Business Intelligence Enterprise Edition to Use LDAP
2.9.3.2
About Configuring JD Edwards EnterpriseOne to Use LDAP
2.9.3.3
About Configuring JD Edwards World to Use LDAP
Index