CHAPTER 13Securing Access to Oracle BI

This part of the book will focus on securing Oracle Business Intelligence (Oracle BI) Enterprise Edition. This process can easily be divided into two topics: securing access to Oracle BI and securing the data and content surfaced by Oracle BI. This chapter focuses primarily on the first topic, including external authentication methods, capturing user ID and group membership information, and single sign-on (SSO) integration. Some prerequisite topics are also covered, as well as a discussion on securing communication between components in an Oracle BI system.

The next chapter will focus on securing of Oracle BI content (dashboards, ad hoc requests, and reports) as well as row-and column-level security. To ...

Get Applied Oracle Security: Developing Secure Database and Middleware Environments now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.