O'Reilly logo

Applied Oracle Security by Bryan Wise, Richard Wark, Patrick Sack, Tyler Muth, Hamza Jahangir, Scott Gaetjen, David Knox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 14Securing Oracle BI Content and Data

In Chapter 13, we talked about securing access to the Oracle Business Intelligence (BI) server itself. Much of the discussion focused on authentication and authorization, as these two topics represent the critical and important first steps of the security lifecycle. Now let’s move into the realm of securing the actual data and content served up by Oracle BI.

At this point, Oracle BI knows who the end user is and knows the groups in which the user belongs. It will use this information to make sure that the end user sees only the content and data he or she is supposed to see. To run a report or dashboard successfully, the user must have access both to the web content (the dashboard or report definition) ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required