Common Security Tasks After Installation

The common security tasks performed after a successful Oracle Business Intelligence software installation are different according to purpose.

Common reasons to install Oracle Business Intelligence are:

  • Evaluate the product

  • Implement the product

    Implementation typically involves moving through the product lifecyle of using the product in one or more of the following environments:

    • Development

    • Test

    • Production

Common Security Tasks to Evaluate Oracle Business Intelligence

The table contains common security tasks performed to evaluate Oracle Business Intelligence and provides links for more information.

Task Description For Information

Understand the Oracle Fusion Middleware security model and theOracle Business Intelligence default security configuration.

Familiarize yourself with the key elements of the Oracle Fusion Middleware security model and the Oracle Business Intelligence default security configuration after a successful installation.

Introduction to Security in Oracle Business Intelligence

Security Configuration Using the Sample Application

Securing Applications with Oracle Platform Security Services

Add users and groups to the default identity store.

Create new User and group definitions for the embedded directory server using Oracle WebLogic Server Administration Console.

Creating a New User in the Embedded WebLogic LDAP Server

Oracle WebLogic Server Administration Console Online Help

Add a new member to an application role.

Add a new user or group as a member to an application role, such as BIConsumer.

Modifying Application Roles Using Fusion Middleware Control

Securing Applications with Oracle Platform Security Services

Create a new application role based on an existing application role.

Create a new application role based on an existing application role by copying it and naming the copy.

Creating and Deleting Application Roles Using Fusion Middleware Control

Securing Applications with Oracle Platform Security Services

Common Security Tasks to Implement Oracle Business Intelligence

The table contains common security tasks performed when you implement Oracle Business Intelligence and provides links for more information. The following tasks are performed in addition to the tasks listed in Common Security Tasks to Evaluate Oracle Business Intelligence.

Task Description For Information

Transition to using your enterprise directory server as the authentication provider and identity store.

Configure your enterprise directory server to become the authentication provider and identity store.

Configuring Oracle Business Intelligence to Use Alternative Authentication Providers

Legacy Security Administration Options

Create a new application role.

Create a new application role and make the role a grantee of an application policy.

Creating and Deleting Application Roles Using Fusion Middleware Control

Assign a group to a newly created application role.

Assign a group to a newly created application role to convey the permission grants to group members.

Modifying Application Roles Using Fusion Middleware Control

Decide whether to use SSL.

Decide whether to use SSL communication and devise a plan to implement.

Configuring SSL in Oracle Business Intelligence

Decide whether to use an SSO provider in your deployment.

Decide whether to use SSO authentication and devise a plan to implement.

Enabling SSO Authentication