qr code generator with logo javascript Securing Access to Oracle BI in Java

Generation QR Code 2d barcode in Java Securing Access to Oracle BI

Securing Access to Oracle BI
Encoding QR Code In Java
Using Barcode maker for Java Control to generate, create QR image in Java applications.
QR Code ISO/IEC18004 Recognizer In Java
Using Barcode scanner for Java Control to read, scan read, scan image in Java applications.
FIGURE 13-9
Barcode Encoder In Java
Using Barcode drawer for Java Control to generate, create bar code image in Java applications.
Read Barcode In Java
Using Barcode recognizer for Java Control to read, scan read, scan image in Java applications.
OAM policy setup
QR Code JIS X 0510 Maker In Visual C#
Using Barcode encoder for VS .NET Control to generate, create QR Code 2d barcode image in Visual Studio .NET applications.
QR Code 2d Barcode Maker In .NET
Using Barcode encoder for ASP.NET Control to generate, create QR Code image in ASP.NET applications.
Configure the Impersonator User
Print Denso QR Bar Code In .NET
Using Barcode generator for .NET Control to generate, create QR-Code image in Visual Studio .NET applications.
Encode QR Code 2d Barcode In Visual Basic .NET
Using Barcode encoder for Visual Studio .NET Control to generate, create QR Code image in Visual Studio .NET applications.
Recall from earlier in this chapter that you must be logged into the Oracle BI server When SSO is not configured, the Oracle BI presentation server will pass on the username and password that you provided to the BI server for authentication When you enable SSO, the BI presentation server no longer knows the username and password of the end user That information is captured and validated by the SSO server (OAM in our example) To overcome this situation, the presentation server will log into the BI server as a common user (called Impersonator) and will tell the BI server to run everything as the true end user First a user called Impersonator must be created in the RPD This user should be placed in the Administrators group This user is one of the few users that should be created in the RPD At this point, you should have users called Administrator and Impersonator, and possibly some RPD developer accounts defined in your RPD All other user accounts should be created and managed in the LDAP used by the SSO server For the presentation server to be able to log in as Impersonator, it must know Impersonator s password This set of credentials is stored in a credential store (with the password encrypted) The credential store is used to store credentials for three users: the Impersonator user used here, the BI Publisher administrator, and the Oracle Delivers administrator Use the cryptotools utility to put the Impersonator credentials into the credential store Cryptotools is a command line utility that is used to generate encrypted credentials and store them in an XML-based credential store You must also configure the presentation server to know where the credential store is located and how to open it (the encryption key) I recommend following steps in 8 of the deployment guide of the Oracle BI documentation library
EAN / UCC - 13 Generator In Java
Using Barcode creator for Java Control to generate, create UPC - 13 image in Java applications.
UPC-A Supplement 2 Generation In Java
Using Barcode generation for Java Control to generate, create UCC - 12 image in Java applications.
Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence
Drawing ANSI/AIM Code 128 In Java
Using Barcode maker for Java Control to generate, create Code 128 image in Java applications.
Making Code 39 Extended In Java
Using Barcode creation for Java Control to generate, create ANSI/AIM Code 39 image in Java applications.
The following illustration shows the overall process of SSO integration with Oracle BI
Leitcode Creator In Java
Using Barcode generation for Java Control to generate, create Leitcode image in Java applications.
Linear Barcode Creation In Visual Basic .NET
Using Barcode creator for .NET framework Control to generate, create Linear Barcode image in Visual Studio .NET applications.
1 OAM sends the username of the authenticated user to the presentation server 2 The presentation server looks up the credentials for the Impersonator user from the credential store 3 The presentation server logs into the BI server as Impersonator and tells the BI server to execute all queries as the authenticated web user
Decoding EAN-13 Supplement 5 In VB.NET
Using Barcode scanner for .NET framework Control to read, scan read, scan image in .NET framework applications.
Scanning EAN-13 In None
Using Barcode decoder for Software Control to read, scan read, scan image in Software applications.
Configure the Presentation Server
EAN128 Generation In Objective-C
Using Barcode creation for iPhone Control to generate, create UCC - 12 image in iPhone applications.
Code 39 Full ASCII Creator In None
Using Barcode creator for Microsoft Word Control to generate, create Code39 image in Word applications.
As mentioned, the presentation server must be configured to use the credential store Additional configuration steps are needed to complete the setup of SSO Both of these changes are made by editing the instanceconfigxml file Recall that OAM is providing the end user s UID via a cookie variable called BI_USER The presentation server needs to know where to get the end user s identity so that it can be passed on to the BI server together with Impersonator s credentials (These steps are also documented in the deployment guide) When you re finished making changes to the instanceconfigxml file, it should include these sections:
Print Code-128 In VS .NET
Using Barcode generator for VS .NET Control to generate, create Code-128 image in VS .NET applications.
Bar Code Reader In Visual Basic .NET
Using Barcode reader for .NET Control to read, scan read, scan image in Visual Studio .NET applications.
<CredentialStore> <CredentialStorage type= file path= /home/oracle/product/1013/biee/OracleBIData/web/ config/credentialstorexml passphrase= secret /> </CredentialStore> <Auth> <SSO enabled="true"> <ParamList> <Param name="IMPERSONATE" source="cookie" nameInSource="BI_USER"/> </ParamList> <LogoffUrl>http://aosdbusoraclecom:7778/access/oblix/lang/en-us/logouthtml</LogoffUrl> <LogonUrl>http://aosdbusoraclecom:7777/analytics</LogonUrl> </SSO> </Auth> <Listener>
13:
<Firewall> <Allow address="127001"/> <Allow address="101468350"/> </Firewall> </Listener>
Securing Access to Oracle BI
Notice the paramlist in the Auth element This tells Oracle BI to get the name of the user to be impersonated (the end user) from a cookie in the variable called BI_USER The presentation server now has all the information it needs to log into the BI server as the user called impersonator and run everything as the end user Now we have set up our SSO server, OAM, to protect Oracle BI We have also configured Oracle BI to log in automatically after OAM has authenticated the end user To accomplish the Auto Login, the presentation server logged into Oracle BI as Impersonator and told the BI server to run everything as if the web user has actually logged into Oracle BI The BI server will now perform the necessary initialization blocks to complete the setup of the end user s session In particular, it will run the initialization blocks to set up group membership properly All these initialization blocks are run as the real end user (not the Impersonator user) In fact, everything done by the BI server is run using the permissions of the real end user
Copyright © OnBarcode.com . All rights reserved.