Skip Headers
Oracle® Business Intelligence Applications Security Guide
11
g
Release 1 (11.1.1.8.0)
E49137-01
Index
Contact Us
Next
PDF
·
Mobi
·
ePub
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documentation
Conventions
What's New in This Guide
Notable Features in Oracle BI Applications Documented in This Guide
1
Integrating Security for Oracle BI Applications
1.1
Introduction
1.1.1
High Level Steps for Setting Up Security in Oracle BI Applications
1.1.2
What Tools Configure Security in Oracle Business Intelligence Applications?
1.1.3
What Security Levels Does Oracle BI Applications Use?
1.1.4
About Duty Roles in Oracle BI Applications
1.1.4.1
Viewing, Creating, and Editing Duty Roles
1.1.4.2
Authorizing User Access Using Roles
1.1.5
How to Define New Groups and Mappings for Users and BI Roles
1.1.5.1
How to Use Fusion Middleware to Provision an End User
1.1.5.2
How to Use a Repository Initialization Block to Provision an End User
1.1.6
Checking Oracle BI Applications User Responsibilities
1.1.7
About Managing Presentation Services Catalog Privileges in Oracle Business Intelligence
1.1.8
About Object-Level Security
1.1.8.1
Metadata Object-Level Security in the RPD
1.1.8.2
Metadata Object-Level Security in Presentation Services
1.1.9
About Data-Level Security
1.1.9.1
Overview of Data-Level Security in Oracle BI Applications
1.1.9.2
Implementing Data-Level Security in the Oracle BI Repository
1.1.9.3
Data-Level Security Duty Roles in Oracle BI Applications
1.1.9.4
About Data-Level Security Design in Oracle BI Applications
1.1.10
About User-Level Security
1.1.11
Security Overview of Configuration Manager and Functional Setup Manager
1.1.12
About Permissions in Configuration Manager and Functional Setup Manager
1.1.12.1
About Permissions in Configuration Manager
1.1.12.2
About Permissions in Functional Setup Manager
1.1.13
Additional Sources of Information About Oracle BI Applications Security
1.2
Extending Security in Oracle BI Applications
1.3
Using Oracle BI Applications Functional Setup Manager Informational Tasks to Set Up Security
A
Configuring Security
A.1
Informational Task Reference - Security
A.1.1
How to Implement Accounts Receivable Security for PeopleSoft
A.1.2
How to Setup Accounts Payable Security for Oracle Fusion Applications
A.1.3
How to Set Up Accounts Payable Security for Oracle E-Business Suite
A.1.4
How to Setup Accounts Payable Security for PeopleSoft
A.1.5
How to Set Up Accounts Receivable Security for Oracle Fusion Applications
A.1.6
How to Set Up Accounts Receivable Security for Oracle E-Business Suite
A.1.7
How to Set Up Fixed Asset Security for Oracle Fusion Applications
A.1.8
How to Set Up Fixed Asset Security for E-Business Suite
A.1.9
How to Set Up Fixed Asset Security for PeopleSoft
A.1.10
How to Set Up Manager Hierarchy Base Security for Peoplesoft
A.1.11
How to Set Up Project Cost and Control Security for PeopleSoft
A.1.11.1
Security by Business Unit
A.1.11.2
Security by Project
A.1.11.3
Configuring BI Duty Roles
A.1.12
How to Set Up Project Billing and Revenue Security for Peoplesoft
A.1.12.1
Security by Business Unit
A.1.12.2
Security by Project
A.1.12.3
Configuring BI Duty Roles
A.1.13
How to Set Up Project Billing and Revenue Security For Oracle
A.1.13.1
Configuring BI Duty Roles
A.1.14
How to Set Up Project Cost and Control Security for Oracle Fusion
A.1.14.1
Configuring BI Duty Roles
A.1.15
How to Set Up CRM Primary Organization Based Security for Siebel
A.1.15.1
Configuring BI Duty Roles
A.1.16
How to Set Up CRM Primary Employee/Position Hierarchy Based Security for Siebel
A.1.16.1
Configuring BI Duty Roles
A.1.17
How to Set Up SIA Student Financial Security for Peoplesoft
A.1.18
How to Set Up SIA Administration Recruiting Security for Peoplesoft
A.1.19
How to Set Up SIA Student Records Security for Peoplesoft
A.1.20
How to Implement Security For Order Management Analytics
A.1.20.1
How to implement OM Inventory Org Based Security for EBS
A.1.20.2
How to implement OM Inventory Org Based Security for Oracle Fusion Applications
A.1.20.3
How to implement OM Operating Unit Org-based Security for EBS
A.1.20.4
How to implement OM Operating Unit Org-based Security for Oracle Fusion Applications
A.1.20.5
How to Grant Cross Functional Access to Order Management Users
A.1.21
How to set up HR Supervisor Hierarchy Based Data Security
A.1.21.1
Introduction
A.1.21.2
Line Manager (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.3
Payroll Manager (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.4
Compensation Analyst (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.5
Compensation Manager (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.6
Recruiting Manager (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.7
Recruiting VP (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.8
Time Collection Manager (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.9
Human Resource VP (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.10
Human Resource Analyst (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.11
Human Resource Manager (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.12
Learning Manager (secured by HR Supervisor Hierarchy List) AU BI Data
A.1.21.13
HR Duty Role to Oracle BI Applications HR Presentation Catalog Mapping
A.1.22
How to set up Department Based Data Security
A.1.22.1
Introduction
A.1.22.2
Line Manager (secured by Department List) AU BI Data
A.1.22.3
Payroll Manager (secured by Department List) AU BI Data
A.1.22.4
Compensation Analyst (secured by Department List) AU BI Data
A.1.22.5
Compensation Manager (secured by Department List) AU BI Data
A.1.22.6
Recruiting Manager (secured by Department List) AU BI Data
A.1.22.7
Recruiting VP (secured by Department List) AU BI Data
A.1.22.8
Time Collection Manager (secured by Department List) AU BI Data
A.1.22.9
Human Resource VP (secured by Department List) AU BI Data
A.1.22.10
Human Resource Analyst (secured by Department List) AU BI Data
A.1.22.11
Human Resource Manager (secured by Department List) AU BI Data
A.1.22.12
Learning Manager (secured by Department List) AU BI Data
A.1.22.13
HR Duty Role to Oracle BI Applications HR Presentation Catalog Mapping
A.1.23
How to Set Up Price Analytics Security for EBS
A.1.24
How to set up HR Position Hierarchy Based Data Security
A.1.24.1
Introduction
A.1.24.2
Line Manager (secured by HR Position Hierarchy List) AU BI Data
A.1.24.3
Payroll Manager (secured by HR Position Hierarchy List) AU BI Data
A.1.24.4
Compensation Analyst (secured by HR Position Hierarchy List) AU BI Data
A.1.24.5
Compensation Manager (secured by HR Position Hierarchy List) AU BI Data
A.1.24.6
Recruiting Manager (secured by HR Position Hierarchy List) AU BI Data
A.1.24.7
Recruiting VP (secured by HR Position Hierarchy List) AU BI Data
A.1.24.8
Time Collection Manager (secured by HR Position Hierarchy List) AU BI Data
A.1.24.9
Human Resource VP (secured by HR Position Hierarchy List) AU BI Data
A.1.24.10
Human Resource Analyst (secured by HR Position Hierarchy List) AU BI Data
A.1.24.11
Human Resource Manager (secured by HR Position Hierarchy List) AU BI Data
A.1.24.12
Learning Manager (secured by HR Position Hierarchy List) AU BI Data
A.1.24.13
HR Duty Role to Oracle BI Applications HR Presentation Catalog Mapping
A.1.25
How to set up Payroll Legislative Data Group Based Data Security
A.1.26
How to set up Payroll Based Data Security
A.1.27
How to Set Up Project GL Reconciliation Security for Peoplesoft
A.1.27.1
Configuring BI Duty Roles
A.1.28
How to Set Up Project Resource Management Security for Peoplesoft
A.1.28.1
Security by Business Unit
A.1.28.2
Security by Project
A.1.28.3
Configuring BI Duty Roles
A.1.29
How to Set Up General Ledger Security for Peoplesoft
A.1.29.1
Configuring Ledger Security
A.1.29.2
Configuring GL Segment Security using PeopleSoft Chartfields
A.1.29.3
Configuring GL Segment Security
A.1.29.4
Configuring BI Duty Roles
A.1.30
How to Set Up Project GL Reconciliation Security for PeopleSoft
A.1.30.1
Configuring BI Duty Roles
A.1.31
How to Set Up General Ledger Security for E-Business Suite
A.1.31.1
Configuring Ledger Security
A.1.31.2
Configuring GL Segment Security
A.1.31.3
Configuring BI Duty Roles
A.1.32
How to Set Up General Ledger Security for Fusion Applications
A.1.32.1
Introduction
A.1.32.2
Configuring GL Segment Security
A.1.33
How to Set Up CRM Territory Hierarchy Based Security for Oracle Fusion
A.1.33.1
Configuring BI Duty Roles
A.1.34
How to Set Up Project Billing and Revenue Security for E-Business Suite
A.1.34.1
Configuring BI Duty Roles
A.1.35
How to Set Up CRM Resource Organization Based Security for Oracle Fusion
A.1.35.1
Configuring BI Duty Roles
A.1.36
How to Set Up Price Analytics Security for Siebel Applications
A.1.36.1
Configuring BI Duty Roles
A.1.37
How to Set Up Project Cost and Control Security for E-Business Suite
A.1.37.1
Configuring BI Duty Roles
A.1.38
How to implement Security for Supply Chain Analytics
A.1.38.1
Configuring BI Duty Roles
A.1.39
How to Set Up CRM Partner Organization Based Security for Oracle Fusion
A.1.39.1
Configuring BI Duty Roles
A.1.40
How to Set Up Service Analytics Security for Siebel
A.1.41
How to implement Inventory Org Based Security for EBS Manufacturing Analytics
A.1.42
How To Customize Extended Cross Functional Security for Employee Expenses
A.1.43
How To Customize Extended Cross Functional Security for Accounts Payables
A.1.44
How to Grant GL Security Data Role to HR VP Users
A.1.45
How To Customize Security for Procurement Executive / Spend Analyst
A.1.46
How to Set Up CRM Partner Channel Based Security for Oracle Fusion
A.1.46.1
Configuring BI Duty Roles
A.1.47
How to Set Up CRM Partner Account Team Based Security for Oracle Fusion
A.1.47.1
Configuring BI Duty Roles
A.1.48
How to Set Up Project Resource Management Security for E-Business Suite
A.1.48.1
Configuring BI Duty Roles
A.1.49
How to Implement Procurement and Spend Analytics Security
A.1.49.1
How to implement Hierarchy Based Security for Employee Expense Subject Areas
A.1.49.2
How to implement Org Based Security for Employee Expense Subject Areas
A.1.49.3
How to implement Procurement and Spend Subject Areas Security for Suppliers
A.1.49.4
How to implement Procurement and Spend Security for Procurement users
A.1.49.5
Other Security in Procurement and Spend
A.1.50
How to Set Up CRM Resource Hierarchy Based Security for Oracle Fusion
A.1.50.1
Configuring BI Duty Roles
A.1.51
How to Set Up Security for PIM in Oracle EBS
A.1.52
How to Set Up Security for Enterprise Asset Management Analytics
Index