Set Up the Risk Management Dashboard Icon

In Oracle Transaction Business Intelligence (OTBI), you can create a dashboard that displays coordinated, comprehensive analyses of Risk Management data you want to track. Once you have a custom dashboard, you can link it to a Risk Management Dashboard icon that opens your dashboard from the Risk Management springboard.

The Risk Management Dashboard icon is available to users who have a privilege called View Risk Management Dashboard (GTG_VIEW_RISK_MANAGEMENT_DASHBOARD). If your organization customizes roles, the icon appears on the springboard only after you add this privilege to your job roles. (See Copy or Edit Risk Management Roles in the Security Console.) However, the privilege is included in predefined roles, so if you use them the icon appears on the springboard by default. The data records available to each dashboard user are determined by data security configured in the Risk Management applications.

The icon opens a dashboard only after you create a link to one. Here's how:

  1. Create a dashboard, if you haven't already. (See An Introduction to Working with Dashboards.)

  2. In OTBI, use the Open option (not the Edit option) to open your dashboard in the BI Catalog. Then copy its URL from the search field of your web browser.

  3. Navigate to Risk Management > Setup and Administration > Configuration Options. In the Risk Management Dashboard Configuration panel, click Edit.

  4. Paste the dashboard URL in the Custom Dashboard URL field, and click Save.

Once setup is complete, click the Risk Management Dashboard icon on the Risk Management springboard to open your dashboard. The dashboard occupies the web-browser tab originally occupied by the springboard, effectively displacing it. To return to the springboard, right-click in the dashboard and, in the resulting menu, select the Back option.

Note: If you choose not to use the icon, you can remove it from the springboard by removing the View Risk Management Dashboard privilege from the roles assigned to your users. If your organization uses predefined Risk Management roles, this would require creating custom copies of the roles, removing the privilege from them, and assigning the role copies to your users.