O'Reilly logo

Applied Oracle Security by Bryan Wise, Richard Wark, Patrick Sack, Tyler Muth, Hamza Jahangir, Scott Gaetjen, David Knox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 13Securing Access to Oracle BI

This part of the book will focus on securing Oracle Business Intelligence (Oracle BI) Enterprise Edition. This process can easily be divided into two topics: securing access to Oracle BI and securing the data and content surfaced by Oracle BI. This chapter focuses primarily on the first topic, including external authentication methods, capturing user ID and group membership information, and single sign-on (SSO) integration. Some prerequisite topics are also covered, as well as a discussion on securing communication between components in an Oracle BI system.

The next chapter will focus on securing of Oracle BI content (dashboards, ad hoc requests, and reports) as well as row-and column-level security. To ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required