Skip Headers
Oracle® Fusion Middleware Security Guide for Oracle Business Intelligence Applications
11g Release 1 (11.1.1.7)

Part Number E37986-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
PDF · Mobi · ePub

Index

C  D  E  F  G  I  J  M  O  P  R  S  T  U 

C

Configuration Manager
permissions, 1.1.12.1
security for, 1.1.11

D

data security design, 1.1.9.3
Data Security Groups
about, 1.1.9.2
data warehouse tables
data security design, 1.1.9.3
data-level security
about, 1.1.3
detailed description, 1.1.9
how to implement, 1.1.9.2
initialization blocks for, 1.1.9.2
overview, 1.1.9.1
Duty Roles required to access Configuration Manager and FSM, 1.1.11

E

extending BI Applications security model, 1.2

F

FSM
permissions, 1.1.12.2
security for, 1.1.11

G

groups
using security groups, 1.1.4

I

initialization blocks
data-level security, 1.1.9.2

J

JD Edwards
how to check user responsibilities, 1.1.6

M

metadata
object level security, repository groups, 1.1.8
object-level security, 1.1.8.2
reloading, 1.1.7
metadata object level security, 1.1.8.1
repository groups, 1.1.8.1

O

object-level security
about, 1.1.3
metadata, 1.1.8.1, 1.1.8.2
Presentation Services objects, 1.1.8.2
Oracle BI
Administration Tool, 1.1.2
Presentation Services Administration, 1.1.2
repository groups, 1.1.8
Server metadata, reloading, 1.1.7

P

permissions
in DAC, Configuration Manager, FSM Manager, 1.1.12
Permissions in Configuration Manager, 1.1.12.1
Permissions in Functional Setup Manager, 1.1.12.2

R

reloading
Oracle BI Server metadata, 1.1.7
repository groups, 1.1.8.1

S

security
adding a user responsibility, 1.1.7
Data Security Groups, 1.1.9.2
data-level security, about, 1.1.9.1
data-level security, implementing, 1.1.9.2
example security groups, 1.1.4
groups, 1.1.4, 1.1.9.2
metadata object level security (repository groups), about, 1.1.8, 1.1.8.1
process for extending model, 1.2
security groups, 1.1.4
tools for configuring, 1.1.2
types
data-level, 1.1.3
object-level, 1.1.3
user-level, 1.1.3
types of security, about, 1.1
user responsibilities, checking, 1.1.6
security groups
examples, 1.1.4
using, 1.1.4
security model
extending BI Applications security model, 1.2
security overview
Oracle BI Applications Configuration Manager and FSM, 1.1.11

T

tools
for configuring security, 1.1.2
Oracle BI Administration Tool, 1.1.2
Oracle BI Presentation Services Administration, 1.1.2

U

user responsibilities
how to add, 1.1.7
how to check, 1.1.6, 1.1.6
how to check in JD Edwards, 1.1.6
registering new user, 1.1.7
user-level security
about, 1.1.3, 1.1.10
how to set up, 1.1.10