High-Level Roadmap for Setting Up Security in Oracle Business Intelligence

Use this high level roadmap to understand typical sequence of actions to maintain security in Oracle Business Intelligence.

  1. Read the rest of this chapter to get an overview of security concepts, tools, and terminology.
  2. Decide which authentication provider to use to authenticate users.
  3. Set up the required users and groups.
  4. Set up the required application roles.
  5. Assign each group to an appropriate application role.
  6. Fine-tune the permissions that users and groups have in the Oracle BI repository.
  7. Fine-tune the permissions that users and groups have in the Oracle BI Presentation Catalog.
  8. If required, configure Single Sign-On (SSO).
  9. If required, configure Secure Sockets Layer (SSL).