14 Applying Data Access Security to Repository Objects

Learn about data access security available for Oracle BI repository objects.

Data access security controls the right to view and modify data. You can use the following data access security methods:

  • Row-level security.

  • Object permissions.

  • Query limits.

Tasks required to implement data access security include managing users, groups, and application roles, setting up custom LDAP servers, and managing custom authenticators, are covered in Security Guide for Oracle Business Intelligence Enterprise Edition.

  • Setting up SSL connections.

  • Defining application roles and functional groups.

    You must create users and application roles before you can implement data access security.

  • Assigning users to application roles and functional groups.

  • Setting up LDAP servers.

  • Defining and managing custom authenticators.

In the Oracle BI Administration Tool use online mode to implement data access security. If you are using offline mode, see About Applying Data Access Security in Offline Mode.Oracle Business Intelligence usage tracking performs data access security auditing. See Managing Usage Tracking in System Administrator's Guide for Oracle Business Intelligence Enterprise Edition.

This chapter contains the following topics: