14 Applying Data Access Security to Repository Objects

Learn about the different types of data access security available for Oracle BI repository objects and explains how to apply them.

Data access security controls rights to view and modify data. You can use several different methods of data access security with Oracle Business Intelligence: row-level security implemented in the repository or in the database, object permissions, and query limits.

Other security tasks, including setting up SSL connections, managing users, groups, and application roles, setting up custom LDAP servers, and managing custom authenticators, are covered in Security Guide for Oracle Business Intelligence Enterprise Edition.

Note:

You must create users and application roles before you can implement data access security.

You should plan to implement data access security in the Administration Tool in online mode. If you must perform data access security tasks in offline mode, be sure to read About Applying Data Access Security in Offline Mode first.

Data access security auditing is covered by the Oracle Business Intelligence usage tracking feature. See Managing Usage Tracking in System Administrator's Guide for Oracle Business Intelligence Enterprise Edition for more information.

This chapter contains the following topics: