Index
C D E F G J M O P R S T U
C
- Configuration Manager
-
- permissions, 1.1.12.1
- security for, 1.1.11
D
- data security design, 1.1.9.4
- Data Security Groups
-
- about, 1.1.9.3
- data warehouse tables
-
- data security design, 1.1.9.4
- data-level security
-
- about, 1.1.3
- detailed description, 1.1.9
- how to implement, 1.1.9.2
- overview, 1.1.9.1
- Duty Roles required to access Configuration Manager and FSM, 1.1.11
E
- extending BI Applications security model, 1.2
F
- FSM
-
- permissions, 1.1.12.2
- security for, 1.1.11
- Task reference for Oracle BI Applications, A
- Functional Configuration
-
- Task Reference, A
G
- GL Segment Security
-
- configuring security for, A.1.32.2
- groups
-
- using security groups, 1.1.4
J
- JD Edwards
-
- how to check user responsibilities, 1.1.6
M
- metadata
-
- object level security, repository groups, 1.1.8
- object-level security, 1.1.8.2
- reloading, 1.1.7
- metadata object level security, 1.1.8.1
-
- repository groups, 1.1.8.1
O
- object-level security
-
- about, 1.1.3
- metadata, 1.1.8.1, 1.1.8.2
- Presentation Services objects, 1.1.8.2
- Oracle BI
-
- Administration Tool, 1.1.2
- Presentation Services Administration, 1.1.2
- repository groups, 1.1.8
- Server metadata, reloading, 1.1.7
P
- permissions
-
- in DAC, Configuration Manager, FSM Manager, 1.1.12
- Permissions in Configuration Manager, 1.1.12.1
- Permissions in Functional Setup Manager, 1.1.12.2
R
- reloading
-
- Oracle BI Server metadata, 1.1.7
- repository groups, 1.1.8.1
S
- security
-
- adding a user responsibility, 1.1.7
- Data Security Groups, 1.1.9.3
- data-level security, about, 1.1.9.1
- data-level security, implementing, 1.1.9.2
- example security groups, 1.1.4
- groups, 1.1.4, 1.1.9.3
- metadata object level security (repository groups), about, 1.1.8, 1.1.8.1
- process for extending model, 1.2
- security groups, 1.1.4
- tools for configuring, 1.1.2
- types
-
- data-level, 1.1.3
- object-level, 1.1.3
- user-level, 1.1.3
- types of security, about, 1.1
- user responsibilities, checking, 1.1.6
- security groups
-
- examples, 1.1.4
- using, 1.1.4
- security model
-
- extending BI Applications security model, 1.2
- security overview
-
- Oracle BI Applications Configuration Manager and FSM, 1.1.11
T
- Task Reference
-
- Functional Configuration, A
- tools
-
- for configuring security, 1.1.2
- Oracle BI Administration Tool, 1.1.2
- Oracle BI Presentation Services Administration, 1.1.2
U
- user responsibilities
-
- how to add, 1.1.7
- how to check, 1.1.6, 1.1.6
- how to check in JD Edwards, 1.1.6
- registering new user, 1.1.7
- user-level security
-
- about, 1.1.3, 1.1.10
- how to set up, 1.1.10