A security model defines access control. Access control of system resources is achieved by requiring users to authenticate at login and by restricting users to only those resources for which they are authorized.
While BI Publisher can make use of several different security models, this guide provides basic configuration details to configure either a Fusion Middleware security model or a BI Publisher security model. For more information about both security models, refer to the following sections.
For more advanced details about both security models and information about other security models, refer to the BI Publisher documentation on Oracle Technical Network (OTN).
Using the Fusion Middleware Security Model
Using the BI Publisher Security Model
Legal Notices
Copyright © 2016,
Oracle and/or its affiliates. All rights reserved.
Last Published Thursday, June 23, 2016