CHAPTER 14Securing Oracle BI Content and Data
In Chapter 13, we talked about securing access to the Oracle Business Intelligence (BI) server itself. Much of the discussion focused on authentication and authorization, as these two topics represent the critical and important first steps of the security lifecycle. Now let’s move into the realm of securing the actual data and content served up by Oracle BI.
At this point, Oracle BI knows who the end user is and knows the groups in which the user belongs. It will use this information to make sure that the end user sees only the content and data he or she is supposed to see. To run a report or dashboard successfully, the user must have access both to the web content (the dashboard or report definition) ...
Get Applied Oracle Security: Developing Secure Database and Middleware Environments now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.