javascript qr code generator svg Security Policies Within the BI Server in Java

Creator QR Code JIS X 0510 in Java Security Policies Within the BI Server

Security Policies Within the BI Server
QR Code Drawer In Java
Using Barcode generation for Java Control to generate, create QR Code image in Java applications.
QR Recognizer In Java
Using Barcode reader for Java Control to read, scan read, scan image in Java applications.
Securing data is done at two levels in Oracle BI The first level is a coarse level and involves giving people access to subject areas similar to giving users access to a schema in a database If a user has access to a subject area, he will be able to perform queries against that subject area If a user does not have access to a subject area, he will not even see that the subject area exists It will not be usable in any fashion in Oracle BI The second level of data security occurs at a very fine level and is either row- or column-based security, and this is the primary focus of this chapter
Encode Barcode In Java
Using Barcode drawer for Java Control to generate, create barcode image in Java applications.
Barcode Decoder In Java
Using Barcode scanner for Java Control to read, scan read, scan image in Java applications.
Subject Area Security
Drawing QR Code JIS X 0510 In C#
Using Barcode printer for .NET Control to generate, create QR Code 2d barcode image in Visual Studio .NET applications.
QR Code Creator In .NET
Using Barcode generator for ASP.NET Control to generate, create QR Code ISO/IEC18004 image in ASP.NET applications.
Setting up subject area security is quite simple Technically, security is applied to the presentation catalog in the BI server metadata As mentioned, a one-to-one correspondence exists between BI server metadata presentation catalogs and the subject areas that appear when using Oracle Answers The terms presentation catalogs and subject areas are often used interchangeably, and they will both be used here as well As shown in Figure 14-3, to set up subject area security, you modify the permissions in the Presentation Catalog properties dialog box in the Administration tool Read access to a subject area can be granted to a user or a group 13 discussed the benefits of externalizing security If you have externalized security, access to subject areas can be accomplished only at the group level, because users are not stored in the RPD This same restriction does not apply in the same way to fine-grained security within the BI server, as you will see in the next section
QR Code Creation In .NET
Using Barcode generator for .NET Control to generate, create QR Code image in .NET framework applications.
Encoding QR Code JIS X 0510 In VB.NET
Using Barcode creator for Visual Studio .NET Control to generate, create QR Code image in .NET framework applications.
14:
Encode UCC.EAN - 128 In Java
Using Barcode printer for Java Control to generate, create GTIN - 128 image in Java applications.
UPC Symbol Encoder In Java
Using Barcode generator for Java Control to generate, create Universal Product Code version A image in Java applications.
Securing Oracle BI Content and Data
GS1 DataBar Truncated Generation In Java
Using Barcode creation for Java Control to generate, create GS1 DataBar Limited image in Java applications.
Paint 2D Barcode In Java
Using Barcode creation for Java Control to generate, create Matrix 2D Barcode image in Java applications.
FIGURE 14-3
GS1 - 8 Drawer In Java
Using Barcode maker for Java Control to generate, create UPC - 8 image in Java applications.
Barcode Maker In None
Using Barcode printer for Font Control to generate, create bar code image in Font applications.
Setting up subject area security in the Presentation Catalog dialog box
Barcode Drawer In None
Using Barcode creator for Online Control to generate, create bar code image in Online applications.
Decode Barcode In Java
Using Barcode Control SDK for Java Control to generate, create, read, scan barcode image in Java applications.
Now let s move from the coarse-level security of securing access to subject areas to the finegrained level of applying row- and column-level security This approach follows the best practice of applying security at the most general level and then moving to the most specific level
Data Matrix Generation In None
Using Barcode encoder for Online Control to generate, create DataMatrix image in Online applications.
USS Code 39 Encoder In .NET
Using Barcode creation for ASP.NET Control to generate, create Code 39 image in ASP.NET applications.
Oracle BI s Row-level Security
Draw EAN 128 In None
Using Barcode encoder for Font Control to generate, create UCC.EAN - 128 image in Font applications.
Decode UCC - 12 In .NET
Using Barcode decoder for .NET framework Control to read, scan read, scan image in Visual Studio .NET applications.
Adding row-level security using Oracle BI is accomplished by adding business model filters in the BI server metadata These filters are defined at the group level This does not mean that the filter is the same for everyone in the group in fact, the opposite is almost always true: the filter being added is usually user-specific Let s look at an example This example business model filter is found in each example RPD The point of this simple example is to limit the data to which the product managers have access: product managers should be able to view sales data only for the products they manage A database table called BI_TABLESPRODUCT_MANAGERS will be used in conjunction with the SH sample schema This table has a row for each product that each user is allowed to view As you can see in Figure 14-4, the user biproduct1 manages Game Consoles and the user biproduct2 manages Portable PCs and Desktop PCs Now that the data is in place for this example, we can focus on the steps required to apply a business model filter This will involve creating a session variable to hold information about which products a user manages and creating the business model filter that will be applied to the members of the Product Managers group
Creating the GET_PRODUCT Session Variable 13 discussed how to set up session
variables and offered several examples of using session variables Specifically, they were used to assign group membership dynamically as the user logged into Oracle BI In this example, we use a session variable to store information about which products a user manages The sample RPDs provided at wwwOraclePressBookscom from the Downloads page include an initialization
Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence
FIGURE 14-4
Copyright © OnBarcode.com . All rights reserved.