Skip Headers
Oracle® Fusion Middleware Reference Guide for Oracle Business Intelligence Applications
11g Release 1 (11.1.1)

Part Number E16816-06
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
PDF · Mobi · ePub

Index

A  B  C  D  E  F  G  H  I  J  L  M  N  O  P  R  S  T  U 

A

Administration Page in Oracle BI Presentation Catalog
tools, 1.2.4
aggregate tables
data warehouse tables, 3.2.1
Application Roles
example, 1.1.6.2
assignments for duty roles, 1.5
attributes
historically significant attributes, identifying, 7.8.1
Authorization Policy Manager (APM)
tools, 1.2.2

B

backup and recovery, 4.4.1, 4.4.2

C

certification information, Preface
Configuration Manager
permissions, 1.1.11.2
security for, 1.1.10
cross-module configuration, performing
dimension keys, resolving, 7.9
domain values, working with, 7.10
slowly changing dimensions, changing, 7.8
currency conversion, 3.9
customization
examples, 7.3.3
Source Adapter mapplet. creating, 7.6.3

D

DAC
permissions, 1.1.11.1
Dashboards
granting user access to, 1.3.4
dashboards
granting access to users, 1.3.4
Data Roles
list of default, 1.5
data security design, 1.7.4
data warehouse languages
configuring base and installed languages, 2.1
data warehouse tables
aggregate tables, 3.2.1
data security design, 1.7.4
dimension class tables, 3.2.2
dimension tables, 3.2.3
fact tables, 3.2.5
helper tables, 3.2.6
hierarchy tables, 3.2.7
mini-dimension tables, 3.2.8
naming conventions, 3.1
primary data values, 3.7
staging tables, 3.2.9
standard column prefixes, 3.3
supported list of values, 3.8
system columns, 3.5
table types, 3.2
translation tables, 3.2.10
databases, supported, Preface
Data-level security
about, 1.7
data-level security
about, 1.1.3
initialization blocks for, 1.7.3
dimension class tables
data warehouse tables, 3.2.2
dimension tables
business role-based flags, 3.2.4
data warehouse tables, 3.2.3
dimensions
key resolution, using a lookup, 7.9.1
keys, resolving, 7.9
domain values
and customization, 7.10
importance in customization, 7.10.2
understanding conversion process, 7.10.1
duty role
creating, 1.3.2
duty role assignments, 1.5
Duty Roles
how to create, 1.3.3
list of default, 1.5
duty roles
manage roles and privileges, 1.2.2
view role mapping using Authorization Policy Manager, 1.2.2
Duty Roles required to access Configuration Manager and FSM, 1.1.10

E

ETL
required security privileges and roles, 1.1.8
ETL process
requirements for running, 1.1.8
example Users, Groups, Application Roles, 1.1.6.2
extracts, configuring
extracting additional data, about, 7.6
extracting data from new source table, 7.6.2
extracting new data from existing source table, 7.6.1

F

fact tables
data warehouse tables, 3.2.5
FSM
permissions, 1.1.11.3
security for, 1.1.10

G

GL Segment Security
configuring security for, 1.6.2
granting access to dashboards, 1.3.4
Groups
example, 1.1.6.2

H

helper tables
data warehouse tables, 3.2.6
hierarchies
customizing Product Category Hierarchies, 6.4
hierarchy tables
data warehouse tables, 3.2.7
historically significant attributes
identifying, 7.8.1

I

initialization blocks
data-level security, 1.7.3

J

JAZN
patching, 4.4.1.1
job role
assign to duty role, 1.3.2
creating, 1.3.2
Job Role hierarchies, 1.3.5
Job Roles
list of default, 1.5

L

list of default Duty Roles, Job Roles, and Data Roles, 1.5

M

mapping duty roles
to secure BI Repository and BI Presentation Catalog objects, 1.5
memory requirements, Preface
mini-dimension tables
data warehouse tables, 3.2.8
minimum disk space, Preface
multi-language support
about BI Applications domains, 2.3
about dimension translation tables, 2.4
about pseudo-translations, 2.2
introduction, 2.1
translation tables, 2.1

N

naming conventions
data warehouse tables, 3.1

O

object-level security
about, 1.1.3
Object-level security, about, 1.1.7
operating systems, supported, Preface
Oracle BI Administration Tool
tools, 1.2.3
Oracle Identity Management
to manage users and enterprise roles, 1.2.1

P

password
for RPD, 1.2.3
patches
applying, 4.4
patching
content included in, 4.2
diagnosing whether applied correctly, 4.5
introducing, 4.1
JAZN updates, 4.4.1.1
properties file, 4.8
resolving conflicts, 4.7
rolling back if failed, 4.6
what is updated, 4.3
permissions
in DAC, Configuration Manager, FSM Manager, 1.1.11
Permissions in Configuration Manager, 1.1.11.2
Permissions in DAC, 1.1.11.1
Permissions in Functional Setup Manager, 1.1.11.3
platforms, supported, Preface
primary extract and delete mapping
delete and primary extract sessions, enabling, 7.7.2.2
source-archived records, deletion configuration, 7.7.2.1
working with, 7.7.2
primary extract and delete mappings, understanding, 7.7.1
primary extract and delete mappings, working with, 7.7.2
Product Category Hierarchies
customizing, 6.4

R

records
filtering and deleting, 7.7.1, 7.7.2
source-archived records, deletion configuration, 7.7.2.1
recovery and backup, 4.4.1, 4.4.2
requirements, system, Preface
roadmap
setting up security, 1.1.1
role hierarchies, 1.3.5
role mapping
view using Authorization Policy Manager, 1.2.2
role types
Abstract Roles, 1.1.6.2
Data Roles, 1.1.6.2
Duty Roles, 1.1.6.2
Job Roles, 1.1.6.2
roles
for ETL processes, 1.1.8
RPD password, 1.2.3
changing, 1.2.3

S

security
configuration tools summary, 1.1.2, 1.2
high level setup steps, 1.1.1
tools for configuring, 1.1.2
types
data-level, 1.1.3
object-level, 1.1.3
user-level, 1.1.3
types, about, 1.1.3
security overview
Oracle BI Applications Configuration Manager and FSM, 1.1.10
security policies
about, 1.1.5
security providers, 1.1.4
slowly changing dimensions, configuring
about, 7.8
effective dates, 7.8.2.3
historically significant attributes, identifying, 7.8.1
Type I changing dimension, 7.8.2
Type II slowly changing dimension, 7.8.2.2
Source Adapter mapplet
creating, 7.6.3
source-archived records
deletion configuration, 7.7.2.1
SSL
configuring, 1.4
configuring for BI Applications, 1.4
staging tables
data warehouse tables, 3.2.9
standard column prefixes, 3.3
standard column suffixes, 3.4
supported installation types, Preface
system columns, 3.5
multi-currency codes for, 3.6
system requirements, Preface

T

table types
data warehouse tables, 3.2
tools
Administration Page in Oracle BI Presentation Catalog, 1.2.4
Authorization Policy Manager, 1.1.2
Authorization Policy Manager (APM), 1.2.2
for configuring security, 1.1.2
Oracle BI Administration Tool, 1.1.2, 1.2.3
Oracle BI Presentation Services Administration, 1.1.2
Oracle Identity Management, 1.1.2, 1.2.1
summary of configuration tools for security, 1.1.2, 1.2
using to configure Oracle BI Applications Security, 1.2
translation tables
data warehouse tables, 3.2.10

U

understanding, 1.3.5
user-level security
about, 1.1.3
Users
example, 1.1.6.2
users, 1.3.4
assigning to job roles, 1.3.1
creating, 1.3.1