Skip Headers
Oracle® Fusion Middleware Security Guide for Oracle Business Intelligence Enterprise Edition
11g Release 1 (11.1.1)

Part Number E10543-02
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  R  S  T  U  V  W 

A

privileges
access rights, 2.5.3
controlling, 2.5.2.2
accessing
Fusion Middleware Control, 2.5.1.1
obi stripe, 2.5.1.1
Oracle WebLogic Server Administration Console, 2.4.2
Add Permission dialog, 2.5.3
Administration Console
Provider Specific tab
SSO, 4.4.1
Provider Specific tab settings, 3.2.1.1
to launch, 2.4.2
Administration Console, accessing, 2.4.2
Administration Page in Oracle BI Presentation Catalog
tools, 1.6.4
Administration Server, B.2
Administrator user, creation during upgrade, B.6.1.1
Administrators group,upgrade, B.6.1.1
application policies
creating, 2.5.3
Application Policies page, 2.5.1.1, 2.5.1.1, 2.5.3, 2.5.3
Application Policy
how to create, 2.5.3
how to modify, 2.5.4.1
application policy, 2.5.3
about, B.3
changing permission grants, 2.5.4.1
copying, 2.5.3
creating by copying, 2.5.3
application policy,definition, B.3
Application Role
how to create, 2.5.2.2
how to map to a Group, 2.5.2.3
how to modify, 2.5.4.2
application role, 2.5.4
about, B.3
add or remove members, 2.5.4.2
changing membership, 2.5.4.2
copying, 2.5.2.2
creating, 2.5.2.2, 2.5.2.2, 2.5.2.3
creating by copying, 2.5.2.2
in repository, 2.5.2.1
mapping privileges, 2.7.3
mapping privileges programmatically, 2.7.3
placeholder, 2.5.2.1
valid members, 2.5.2.2
application role mapping,definition, B.3
application role,definition, B.3
Application Roles
benefits, 2.5.2.1
creating, 2.5.2.1
default, 2.5.1.2, 2.5.2.2, 2.5.2.3
example, 1.4.1, 2.3
how to map privileges to, 2.7.3
user membership, 2.7.1
working with default, 2.2
Application Roles page, 2.5.1.1, 2.5.1.1
authenticated role, A.2.1, B.4.1.2
authentication error, 3.2.1.2, 3.2.1.4
authentication options
authentication, about, A.1
authentication, order of, A.1.4
external table authentication, about, A.1.2
external table authentication, setting up, A.1.2
LDAP authentication, about, A.1.1, A.1.1
LDAP authentication, setting up, A.1.1.2
See also security
USER session system variable, defining for LDAP authentication, A.1.1.2
authentication provider
about, B.3
configuring Oracle Internet Directory, 3.2.1.1
authenticator
about, A.1.5
custom authentication, about, A.1.5
definition, A.1.5

B

best practice
creating application roles, 2.5.2.1
HTTP and HTTPS listeners, 5.3
managing Presentation Services Catalog privileges, 2.7.1
mapping groups, 2.5.4.2
policy store, 2.5
SSL certificates, 5.4.2, 5.4.2
SSO authentication, 4
update user GUIDs, 3.2.1.2, 3.2.1.4
URL for SSO authentication, 4.4.3
BI Presentation Server
catalog privileges, 2.7.1
BI Server
role in SSO, 4.2.2
BIAdministrator role, B.4.1.2
BIAdministrators
example, 1.4.1
BIAuthor role, B.4.1.2
BIAuthors
example, 1.4.1
BIConsumer role, B.4.1.2
BIConsumers
example Group, 1.4.1
BIDomain Mbeans, 5.4.1
bifoundation_domain, 2.5.1.1, 2.5.1.3, B.2
BISystem role, B.4.1.2
BISystemUser
configuring, 3.2.1.3

C

case sensitive,key, B.4.3.1
catalog
permissions, B
catalog groups
upgraded systems, 2.7.1
catalog groups,deleting, 2.7.3
catalog groups,precedence, B.4.4.2
caution
application roles, 2.5.4
BISystem application role, 2.5.4.2
SSL pre-requisites, 5.4
caution, system-jazn-data.xml file, 2.5
certificate keys
creating, 5.2.2
certification information, Preface
changing, 2.5.4
application role, 2.5.4
configuring
Web server for SSL, 5.3
Control Flag settings, 4.4.1
controlling permission grants, 2.5.2.2
copy
application policy, 2.5.3
copying
application policy, 2.5.3
application role, 2.5.2.2, 2.5.2.2
coreapplication, 2.5.1.1, 2.5.1.2
create
application policy, 2.5.3
application policy by copying, 2.5.3
Create Application Grant Like dialog, 2.5.3
create application role by copying, 2.5.2.2
Create Application Role Like page, 2.5.2.2
Create Application Role page, 2.5.2.2
Create Like button, 2.5.3
creating
application policies, 2.5.3
application role, 2.5.2.2, 2.5.2.2, 2.5.2.3
Application Roles, 2.5.2.1
certificate keys for SSL, 5.2.2
credential map
oracle.bi.enterprise, 5.2.3
trusted user, 3.2.1.3
credential store
migrating, 3.3
credential store provider
about, 1.10
configuring LDAP-based, 3.3
cwallet.sso file, B.4

D

databases,supported, Preface
default
Application Roles, 2.5.1.2, 2.5.2.2, 2.5.2.3
location of policy store, 2.5
policy store, 3.3
Presentation Catalog privileges, 2.7.2
default directory server
change password, 2.4.6
creating a user, 2.4.3
default security configuration
default security provider configuration, B.4
implementing, B.4
default security providers, B.4
default Users, Groups, Application Roles, 2.2
default Users,Groups,Application Roles
diagram of, 2.2
default,credentials, B.4.3.1
DefaultAuthenticator, B.4
defaut directory server
creating Groups, 2.4.4
deleting,catalog groups, 2.7.3
domain
about, B.2.2
relationship with Oracle WebLogic Server, B.2
dynamically loadable authenticator framework
about, A.1.5
definition, A.1.5

E

Everyone Presentation Services Catalog group, A.2.1
example
Add Group dialog, 2.5.4.2
Application Roles page, 2.5.4.2
BIAdministrators, 1.4.1
BIAuthors Group, 1.4.1
BIConsumers Group, 1.4.1
configuring demonstration SSL certificate, 5.3
Edit Application Role page, 2.5.4.2
incorrect trust store error message, 5.3
installed Users, Groups, Application Roles, 1.7
new application role, 2.5.3
new application role by copying, 2.5.2.2
SSL report output, 5.4.6
example Users, Groups, Application Roles, 1.4.1, 2.3
external table authentication
about, A.1.2
setting up, A.1.2

F

Fusion Middleware Control
accessing, 2.5.1.1
System Mbean Browser
SSL, 5.4

G

Grantee, 2.5.3
Groups
creating, 2.4.4
definition, 1.10
example, 1.4.1, 2.3
how to map to an Application Role, 2.5.2.3
inheritance, 2.7.1
working with default, 2.2
Groups, working with
See also authentication options
GUIDs
authentication errors, 3.2.1.2, 3.2.1.4
updating user, 3.2.1.2, 3.2.1.4

H

how to setup security
detailed steps, 1.8

I

identity asserter, 4.2.1, 4.4.2
identity store
about, 1.10
new authenticator, 4.4.1
installed Users,Groups,Application Roles
diagram of, 2.2
instanceconfig.xml
configuring login and logout for SSO, 4.4.3

J

Java security model, B.2
javax.net.sll.trustStorePassword, 5.3
javax.net.ssl.trustStore, 5.3
Job Manager
configuring, 5.5.2

K

key,case sensitive, B.4.3.1

L

launching
Administration Console, 2.4.2
LDAP
See Lightweight Directory Access Protocol (LDAP)
LDAP credential store, 3.3
Lightweight Directory Access Protocol (LDAP)
authentication, about, A.1.1, A.1.1
authentication, setting up, A.1.1.2
USER session system variable, defining for LDAP authentication, A.1.1.2
list of security terms, 1.10

M

managing
application roles, 2.5.4
catalog privileges, 2.7.1
mapping,definition, B.3
members
changing in application role, 2.5.4.2
memory requirements, Preface
metadata repository
overview to managing security in, 2.6.1
migrating
credential store, 3.3
policy store, 3.3
minimum disk space, Preface
modifying
application role, 2.5.4
mutual SSL authentication, 5.2.1

N

new
application policy, 2.5.3

O

obi stripe, 2.5.3
pre-selected, 2.5.1.1, 2.5.1.1
obi stripe pre-selected, 2.5.1.2
ODBC DSN, 5.5.5
offline repository development, 2.5.2.1
operating systems, supported, Preface
OPTIONAL flag, 4.4.1
Oracle BI
configuring Job Manager, 5.5.2
Oracle BI Administration Tool
overview to using, 2.6.1
tools, 1.6.3
Oracle BI Presentation Server
role in SSO, 4.2.2
Oracle Fusion Middleware Control
tools, 1.6.2
Oracle Fusion Middleware security model
about, B.2
Oracle Internet Directory
configuring as authentication provider, 3.2.1.1
Oracle Platform Security Services, B.2.1
Oracle WebLogic Server
configuring a new asserter, 4.4.2
configuring a new authenticator, 4.4.1
configuring for SSL, 5.3
configuring new authenticator, 4.4.1
domain, B.2
Oracle Weblogic Server
deploying security with, 2
Oracle WebLogic Server Administration Console
summary, 1.6.1
oracle.bi.enterprise credential map, 5.2.3
overview
setup steps, 1.8

P

password
change user, 2.4.6
permission grants
changing, 2.5.4
changing in application policy, 2.5.4.1
permissions, 2.5.3
adding, 2.5.3
non-Oracle Business Intelligence, 2.5.3
placeholder for application role, 2.5.2.1
platforms, supported, Preface
policy store
about, 3.3
default, 3.3
managing, 2.5
migrating, 3.3
policy store provider
about, 1.10
precedence
Presentation Catalog privileges, 2.7.2
precedence,catalog groups, B.4.4.2
Presentation Catalog privileges
about, 2.7.2
privileges
managing Presentation Catalog, 2.7.1
Provider Specific tab, 3.2.1.1, 4.4.1
public and private keys, 5.2.1

R

repositories
new user, adding to, 2.6.2
REQUIRED flag, 4.4.1
requirements, system, Preface
REQUISITE flag, 4.4.1
Roadmap for security setup, 1.1
role
authenticated, B.4.1.2
BIAdministrator, B.4.1.2
BIAuthor, B.4.1.2
BIConsumer, B.4.1.2
BISystem, B.4.1.2

S

SASchInvoke, 5.5.1
SchShutdown, 5.5.1
security
configuration tools summary, 1.6, 1.6
detailed setup steps, 1.8
overview, 1.8
repository, adding new user to, 2.6.2
See also authentication options
terminology, 1.10
security framework
about, B.2
Oracle Platform Security Services, B.2.1
Security Manager, 2.6.1
overview to using, 2.6.1
Security menu, 2.5.1.1
accessing, 2.5.1.2, 2.5.1.2, 2.5.1.3
security provider
about, 1.10
security realm
about, 1.10
security setup Roadmap, 1.1
Session Manager
See also query environment, administering
active query, killing, A.1.7.1
disconnecting a user from a session, A.1.7.1
Session Window fields (table), A.1.7.1
session, viewing, A.1.7.1
update speed, controlling, A.1.7.1
using, about, A.1.7.1
SMTP server, configuring for SSL, 5.4.7
SSL
about, 5.2
Administration Tool, 5.5.4
Catalog Manager, 5.5.3
certificate files, 5.4.4
certificate keys, 5.2.2
cipher suite options, 5.6
commit configuration, 5.4.3
configuring SMTP server, 5.4.7
configuring the Web server, 5.3
confirming status, 5.4.6
credentials in oracle.bi.enterprise map, 5.4.4
default security level, 5.2.1
enabling the configuration for Oracle Business Intelligence, 5.4.5
expired certificates, 5.4.8
generating certificates, 5.4.2
in Oracle Business Intelligence, 5.2.1
locking the configuration, 5.4.1
manual configuration, 5.2.1
mutual authentication, 5.2.1
Oracle BI components involved, 5.2.1
pre-requisites, 5.3
running status report, 5.4.6
sample report output, 5.4.6
troubleshooting tip, 5.4.3.1
verifying certificates, 5.4.4
SSL credential storage, 5.2.3
SSL Everywhere central configuration, 5.2.1
SSL, upgrading, B.6.1
SSL,troubleshooting, 5.4.6
SSO
about, 4.2
configuring a new authenticator, 4.4.1
configuring with Oracle Access Manager, 4.4
considerations, 4.3
editing instanceconfig.xml, 4.4.3
enabling for Oracle Business Intelligence, 4.4.3
identity asserter, 4.2.1
Oracle BI Presentation Services, 4.2.2
permission required for Administration Tool, 4.2
requirements, 4.2
Webgates, 4.2.1
startManagedWebLogic.sh, 5.3
SUFFICIENT flag, 4.4.1
supported installation types, Preface
system
session variables, about and LDAP authentication, A.1.1
variables, about and external table authentication, A.1.2
system requirements, Preface
system-jazn-data.xml file, 2.5, B.4

T

task map
configuring authentication, 2.1
configuring authorization, 3.1
configuring SSL, 5.1
configuring SSL between Oracle BI components, 5.4
configuring SSO authentication, 4.1
terminology, 1.10
tools
Administration Page in Oracle BI Presentation Catalog, 1.6.4
Oracle BI Administration Tool, 1.6.3
Oracle Fusion Middleware Control, 1.6.2
Oracle Weblogic Server, 2
Oracle WebLogic Server Administration Console, 1.6.1
summary of configuration tools for security, 1.6, 1.6
troubleshooting,SSL, 5.4.6
trusted user
configuring, 3.2.1.3
create new user, 3.2.1.3

U

upgrade,Administrators group, B.6.1.1
upgraded systems
catalog groups, 2.7.1
URL
Administration Console, 2.4.2
for SSO, 4.4.3
Fusion Middleware Control, 2.5.1.1
usage tracking, administering
See also Session Manager
user
add to group
default directory server, 2.4.5
change password, 2.4.6
create, 2.4.3
user, definition, 1.10
Users
example, 1.4.1, 2.3
working with default, 2.2
users
new user, adding to repository, 2.6.2

V

variables, using
system session variables, about and LDAP authentication, A.1.1
system variables, about and external table authentication, A.1.2

W

Web server, configuring for SSL, 5.3