Setting Up Security in OTBI Enterprise

Perform the high-level steps for setting up security in OTBI Enterprise.

Before you start, you might review the following information to familiarize yourself with security terminology and concepts, in particular, how Enterprise Roles and Duty Roles control user privileges:
High-level steps for setting up security:
  1. In My Services, create required Enterprise Roles.

    Note:

    Until a user has been assigned an Enterprise Role with appropriate privileges, access to OTBI Enterprise dashboards and analyses is prohibited. This includes the provisioned Administrator.
  2. In My Services, create user accounts for people who will access the BI dashboards and reports.
  3. If you are deploying Taleo, in your Taleo application, create a new user and assign it the default user type System Integration (Administrator WebTop).

    Note:

    Use this username and password during the Initial Configuration stage when you register the Taleo data source in Configuration Manager. If you are not able to create this user, then contact the Taleo administrator. For information about the System Integration (Administrator WebTop) permissions, use the MyOracle Support document Taleo Enterprise Documentation Homepage (Doc ID 1496352.1) to download the User Type Permissions spreadsheet for your Taleo version.
  4. Log a Service Request to provision access to the ODI Console by Oracle Cloud Operations.
  5. Assign administrative Enterprise Roles to appropriate users:
    1. Assign the ASM_APPLICATION_IMPLEMENTATION_ADMIN_ABSTRACT Enterprise Role that is provisioned with the service to one or more users responsible for the implementor role in OTBI Enterprise. This role provides privileges to access Configuration Manager and Functional Setup Manager, as well as ODI.
    2. In Fusion, grant access to users of the BI Cloud Connector Console.
  6. Assign each user to the appropriate Enterprise Roles.