Go to primary content
Oracle Product Lifecycle Analytics Security Guide
Release 3.5
E70278-01
Next
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
1
Overview
2
OPLA Architecture Overview
2.1
OPLA Architecture
3
General Security Principles
3.1
Keep Software Up-To-Date
3.2
Restrict Network Access to Critical Services
3.3
Follow the Principle of Least Privilege
3.4
Monitor System Activity
3.5
Keep Up-To-Date on Latest Security Information
4
Secure Installation and Configuration
4.1
Installation Overview
4.2
Installation - Prerequisites
5
Security Features
5.1
Password Policy
5.2
Security Model
5.2.1
Data-Level Security
5.2.2
Object Level Security
5.2.3
User-Level Security (User Authentication)
5.3
Configuring and Using Authentication in OPLA
5.3.1
Authentication at ETL Layer
5.3.2
Authentication at the ETL Layer using OPLA Encryption Methods
5.3.3
Authentication at the ETL Layer using the ODI Agent
5.3.4
Authentication at the Oracle Business Intelligence Enterprise Edition Layer
5.3.5
LDAP Authentication
5.3.6
External Table Authentication
5.3.7
Database Authentication
5.3.8
Maintaining Oracle BI Server User Authentication
5.4
Configuring and Using Access Control
5.4.1
Access Control at the Folder and File Level
5.4.2
Access Control at the Data-Level
5.4.3
Access Control at the Object-Level
5.4.4
Access Control at the User-Level
5.5
Configuring and Using Security Audit
5.5.1
Configuring and Using OPLA Configurator
6
Security Considerations for Developers
A
OPLA Secure Deployment Checklist
A.1
Secure Deployment Checklist
B
Database Schema Privileges
B.1
Single Database Schema Privileges
B.2
OPLA Multiple Schema Privileges
C
SSL Configuration in Oracle Business Intelligence