Use this high level roadmap to understand typical sequence of actions to maintain security in Oracle Business Intelligence.
- Read the rest of this chapter to get an overview of security concepts, tools, and terminology.
- Decide which authentication provider to use to authenticate users.
- Set up the required users and groups.
- Set up the required application roles.
- Assign each group to an appropriate application role.
- Fine-tune the permissions that users and groups have in the Oracle BI repository.
- Fine-tune the permissions that users and groups have in the Oracle BI Presentation Catalog.
- If required, configure Single Sign-On (SSO).
- If required, configure Secure Sockets Layer (SSL).