The common security tasks performed after a successful Oracle Business Intelligence software installation are different according to purpose.
Common reasons to install Oracle Business Intelligence are:
Evaluate the product
Implement the product
Implementation typically involves moving through the product lifecyle of using the product in one or more of the following environments:
Development
Test
Production
Common Security Tasks to Evaluate Oracle Business Intelligence
The table contains common security tasks performed to evaluate Oracle Business Intelligence and provides links for more information.
Task | Description | For Information |
---|---|---|
Understand the Oracle Fusion Middleware security model and theOracle Business Intelligence default security configuration. |
Familiarize yourself with the key elements of the Oracle Fusion Middleware security model and the Oracle Business Intelligence default security configuration after a successful installation. |
Introduction to Security in Oracle Business Intelligence Security Configuration Using the Sample Application Securing Applications with Oracle Platform Security Services |
Add users and groups to the default identity store. |
Create new User and group definitions for the embedded directory server using Oracle WebLogic Server Administration Console. |
Creating a New User in the Embedded WebLogic LDAP Server Oracle WebLogic Server Administration Console Online Help |
Add a new member to an application role. |
Add a new user or group as a member to an application role, such as BIConsumer. |
Modifying Application Roles Using Fusion Middleware Control Securing Applications with Oracle Platform Security Services |
Create a new application role based on an existing application role. |
Create a new application role based on an existing application role by copying it and naming the copy. |
Creating and Deleting Application Roles Using Fusion Middleware Control Securing Applications with Oracle Platform Security Services |
Common Security Tasks to Implement Oracle Business Intelligence
The table contains common security tasks performed when you implement Oracle Business Intelligence and provides links for more information. The following tasks are performed in addition to the tasks listed in Common Security Tasks to Evaluate Oracle Business Intelligence.
Task | Description | For Information |
---|---|---|
Transition to using your enterprise directory server as the authentication provider and identity store. |
Configure your enterprise directory server to become the authentication provider and identity store. |
Configuring Oracle Business Intelligence to Use Alternative Authentication Providers |
Create a new application role. |
Create a new application role and make the role a grantee of an application policy. |
Creating and Deleting Application Roles Using Fusion Middleware Control |
Assign a group to a newly created application role. |
Assign a group to a newly created application role to convey the permission grants to group members. |
|
Decide whether to use SSL. |
Decide whether to use SSL communication and devise a plan to implement. |
|
Decide whether to use an SSO provider in your deployment. |
Decide whether to use SSO authentication and devise a plan to implement. |