Skip Headers
Oracle® Business Intelligence Applications Security Guide
Version 7.9.6.1
Part Number E14846-01
Home
Book List
Index
Contact Us
Next
View PDF
Contents
List of Figures
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
1
What's New in This Release
1.1
What's New in Oracle Business Intelligence Applications Security Guide, Version 7.9.6.1
2
Integrating Security for Oracle BI Applications
2.1
About Security in Oracle BI Applications
2.1.1
Security Integration Between Oracle Business Enterprise Edition and Oracle BI Applications
2.1.2
Oracle BI Applications Security Types
2.1.3
Use of Security Groups in Oracle BI Applications
2.1.4
Checking Oracle BI Applications User Responsibilities
2.1.5
About Adding a New User Responsibility in Oracle Business Intelligence
2.2
Data-Level Security In Oracle BI Applications
2.2.1
Overview of Data-Level Security in Oracle BI Applications
2.2.2
Implementing Data-Level Security in the Oracle BI Repository
2.2.3
Viewing Permissions in Oracle BI Administration Tool
2.2.4
Initialization Blocks Used for Data-Level Security in Oracle BI Applications
2.2.5
Data Security Groups in Oracle BI Applications
2.3
Object-Level Security in Oracle BI Applications
2.3.1
Metadata Object-Level Security (Repository Groups)
2.3.2
Metadata Object-Level Security (Presentation Services)
2.4
User-Level Security in Oracle BI Applications
2.5
Extending Security in Oracle BI Applications
2.6
Integrating Data Security for Oracle EBS
2.6.1
Oracle BI Applications Authorization for Oracle EBS
2.6.2
Operating Unit-Based Security for Oracle EBS
2.6.2.1
About Operating Unit-Based Security for Oracle EBS
2.6.2.2
Implementation Steps for Operating Unit-Based Security for Oracle EBS
2.6.3
Inventory Org-Based Security for Oracle EBS
2.6.3.1
About Inventory Org-Based Security for Oracle EBS
2.6.3.2
Implementation Steps for Inventory Org-Based Security for Oracle EBS
2.6.4
Ledger-Based Security for Oracle EBS
2.6.4.1
About Ledger-Based Security for Oracle EBS
2.6.4.2
Implementation Steps for Ledger-Based Security for Oracle EBS
2.6.5
Business Group Org-Based Security for Oracle EBS
2.6.5.1
About Business Group Org-Based Security for Oracle EBS
2.6.5.2
Implementation Steps for Business Group Org-Based Security for Oracle EBS
2.6.6
HR Org-Based Security for Oracle EBS
2.6.6.1
About HR Org-Based Security for Oracle EBS
2.6.6.2
Implementation Steps for HR Org-Based Security for Oracle EBS
2.6.7
Human Resource Personnel Data Analyst Security for Oracle EBS
2.6.8
Employee-Based Security for Oracle EBS
2.7
Integrating Data Security for Oracle's PeopleSoft Enterprise Applications
2.7.1
Oracle BI Applications Authorization for PeopleSoft
2.7.2
Operating Unit-Based Security for PeopleSoft Financials
2.7.3
Company Org-Based Security for PeopleSoft Financials and PeopleSoft HR
2.7.4
Ledger-Based Security for PeopleSoft Financials
2.7.5
HR Org-Based Security for PeopleSoft HR
2.7.6
Payables Org-Based Security for PeopleSoft Financials
2.7.7
Receivables Org-Based Security for PeopleSoft Financials
2.7.8
SetID-Based Security for PeopleSoft HR and PeopleSoft Financials
2.7.9
Human Resource Personnel Data Analyst Security for PeopleSoft HR
2.7.10
Employee-Based Security for PeopleSoft
2.8
Integrating Data Security for Oracle's Siebel CRM Applications
2.8.1
About Primary Position-Based Security
2.8.1.1
Introduction
2.8.1.2
Primary Employee/Position Hierarchy-Based Security Group
2.8.1.3
Configuring Oracle BI Repository Table Joins for Primary Employee/Position Hierarchy-Based Security
2.8.2
About Primary Position-Based Security for Siebel CRM Industry Applications
2.8.2.1
Consumer Sector Analytics Security Settings
2.8.2.2
Communications, Media, and Energy (CME) Analytics Security Settings
2.8.2.3
Financial Services Analytics Security Settings
2.8.2.4
Pharma Sales Analytics and Pharma Marketing Analytics Security Settings
2.8.3
About Partner Analytics Security Settings
2.8.3.1
PRM Partner Portal Role-Based Interactive Dashboards Mapping
2.8.3.2
Partner Manager Role-Based Interactive Dashboards Mapping
2.8.3.3
PRM Analytics Subject Area Mappings
2.8.3.4
PRM Analytics Subject Area Visibility
2.8.3.5
PRM Analytics Data-Level Visibility
2.8.4
About Usage Accelerator Analytics Security Settings
2.8.5
About Primary Owner-Based Security
2.8.6
About Business Unit-Based Security
2.9
About Security Integration with Oracle's JD Edwards EnterpriseOne or JD Edwards World
2.9.1
How Oracle BI EE and JD Edwards EnterpriseOne Use LDAP
2.9.2
Integration of User and Object Security
2.9.3
Implementing LDAP Integration for User and Object Security
2.9.3.1
About Configuring Oracle Business Intelligence Enterprise Edition to Use LDAP
2.9.3.2
About Configuring JD Edwards EnterpriseOne to Use LDAP
2.9.3.3
About Configuring JD Edwards World to Use LDAP
Index