You can customize the default security configuration in various ways.
Configure a new authentication provider. See Configuring a New Authentication Provider.
Configure new policy store and credential store providers. See Configuring a New Policy Store and Credential Store Provider.
Migrate policies and credentials from one store to another. See Reassociating the Policy Store and Credential Store.
Create new application roles. See Creating Application Roles Using Fusion Middleware Control.
Create new application policies. See Creating Application Policies Using Fusion Middleware Control.
Modify the permission grants for an application policy. See Changing Permission Grants for an Application Policy.
You can configure another supported LDAP server to be the authentication provider.
Configuring BI Publisher to use an alternative external identity store is performed using the Oracle WebLogic Server Administration Console. BI Publisher delegates authentication and user population management to the authentication provider and identity store configured for the domain it is a part of. For example, if configured to use Oracle WebLogic Server's default authentication provider, then management is performed in the Oracle WebLogic Server Administration Console. If configured to use Oracle Internet Directory (OID), then the OID management user interface is used, and so on.
If using an authentication provider other than the one installed as part of the default security configuration, the default users and groups that are discussed in Default Users and Groups are not automatically present. You can create users and groups with names of your own choosing or re-create the default user and group names if the authentication provider supports this. After this work is completed, you must map the default BI Publisher application roles to different groups again. For example, if the corporate LDAP server is being used as the identity store and you are unable to re-create the BI Publisher default users and groups in it, you must map the default application roles to different groups specific to the corporate LDAP server. Use Fusion Middleware Control to map the groups to application roles.
For information about how to configure a different authentication provider, see Oracle WebLogic Server Administration Console Online Help and Administering Security for Oracle WebLogic Server 12c (12.2.1).
The policy store and credential store can be file-based or LDAP-based.
The supported LDAP server for both stores in this release is Oracle Internet Directory. The pre-requisites for using an LDAP-based store are the same as for both the policy store and credential store. See Securing Applications with Oracle Platform Security Services.
Migrating policies and credentials from one security store to another is called reassociation.
Both policy store and credential store data can be reassociated (migrated) from a file-based store to an LDAP-based store, or from an LDAP-based store to another LDAP-based store
Because the credential store and the policy store must both be of the same type, when reassociating one store you must reassociate the other.
See Securing Applications with Oracle Platform Security Services.
The Fusion Middleware Security model can be customized for your environment by creating your own application policies and application roles.
Existing application roles can be modified by adding or removing members as needed. Existing application policies can be modified by adding or removing permission grants. For more information about managing application policies and application roles, see Securing Applications with Oracle Platform Security Services.
Note:
Before creating a new application policy or application role and adding it to the default BI Publisher security configuration, familiarize yourself with how permission and group inheritance works. It is important when constructing a role hierarchy that circular dependencies are not introduced. Best practice is to leave the default security configuration in place and first incorporate your customized application policies and application roles in a test environment. For more information, see Permission Grants and Inheritance.
You can create a new application role or copy from an existing role using Fusion Middleware Control.
Creating Application Roles
There are two methods for creating a new application role.
Create New — Creates new application role. You can add members when you create the new role, or you can save the new role after naming it and later add members.
Copy Existing — Creates a new application role by copying an existing application role. The copy contains the same members as the original, and the new role will be Grantee of the same application policy. You can modify the copy as required when you create the new role.
Creating a New Application Role
Log into Fusion Middleware Control, navigate to Security, and select Application Roles to display the Application Roles page.
For information, see Accessing Oracle Enterprise Manager Fusion Middleware Control.
Choose obi from Application Stripe list. Click the search icon next to Role Name.
You can view the BI Publisher application roles.
Click Create to display the Create Application Role page. You can enter all information at once or you can enter a Role Name, save it, and complete the remaining fields later. Complete the fields as follows:
In the General section:
Role Name — Enter the name of the application role.
(Optional) Display Name — Enter the display name for the application role.
(Optional) Description — Enter a description for the application role.
In the Members section, Click Add to select the users, groups, or application roles you want to map to the applications role.
From the Type list, select Application Role, User, or Role you want to map to the application role.
Optionally, you can specify the criteria for Principal Name and Display Name.
Click the search icon next to Display Name.
Select the principals from the Searched Principals table.
Click OK.
Click OK to return to the Application Roles page.
The table at the bottom of the page displays the new application role.
Creating an Application Role Based on an Existing role
All BI Publisher permissions are provided and you cannot create new permissions. Permission grants are controlled in the Fusion Middleware Control Application Policies page.
Creating Application Policies
The permission grants are defined in an application policy. An application role, user, or group, is then mapped to an application policy. This process makes the application role, user, or group a Grantee of the application policy.
There are two methods for creating a new application policy:
Create New — Creates a new application policy and adds permissions to it.
Copy Existing — Creates a new application policy by copying an existing application policy. You can name the copy, remove existing permissions, or add new permissions as required.
Creating a New Application Policy
Log in to Fusion Middleware Control, navigate to Security, and select Application Policies to display the Application Policies page.
For information, see Accessing Oracle Enterprise Manager Fusion Middleware Control.
Choose obi from Application Stripe list. Click the search icon next to Principal Name.
You can view the BI Publisher application policies. The Principal column displays the name of the policy Grantee.
Click Create to display the Create Application Grant page.
To add permissions to the policy being created, click Add in the Permissions area to display the Add Permission dialog.
Complete the Search section, and click the search icon next to the Resource Name field.
All permissions located in the obi application stripe are displayed. For information about the BI Publisher permissions, see Default Application Roles and Permissions.
Select the desired BI Publisher permissions, and click Continue. Selecting non-BI Publisher permissions has no effect in the policy.
If required, customize the permission and click Select.
The Permissions section display the selected permissions.
To add an application role, user, or group to the policy being created, click Add in the Grantee section..
In the Add Principal dialog, do the following:
Complete the Search section, and click the search icon next to the Display Name field.
Select the required principals from the Searched Principals list.
Click OK.
Click OK to return to the Application Policies page. You can view the Principal (Grantee) and Permissions of the new policy in the table.
Creating an Application Policy Based on an Existing Policy
The Application Policies page displays the Principal and Permissions of the policy.