OBIEE 10G/11G - Act as (Proxy user) Functionality

Saw Object

in the elements: The maximum number of target users to be listed in the User box in the Act As dialog box. If the number of target users for a proxy user exceeds this value, an edit box, where the proxy user can type the ID of a target user, is rendered rather than a drop-down list of target users. The default is 200.For example between the node, you can insert:
The name that you specify in the element must match the name that you specify in the element in the custom message file.
Assigning the privilege and restarting the BI Presentation Service
For each user whom you want to authorize as a proxy user or for each Presentation Services group whose members you want to authorize as proxy users, you need to assign the Proxy privilege.And then to load the custom message and the configuration file changes, you must restart the BI Presentation Service .
How to
See the proxy level
You can check the proxy level in the “My Account” > Delegate Users tab.Obiee 11g My Account Delegate Users
Unable to sign-in
Check the nqserver.log. You may find this kind of error:
[2012-09-24T16:43:27.000+00:00] [OracleBIServerComponent] [ERROR:1] [] [] 
[ecid: ae920880d33cb0ac:-1efbec60:139e4853ab6:-8000-000000000000dea0] 
[tid: 4587e940]  
[nQSError: 13022] There is no init block for PROXY session variable.

See creating_session_variables_for_proxy_functionality
Documentation / Reference

Discover More
Obi Edition
OBIEE - Installation / Configuration

This page includes all articles on the installation topic of OBIEE. Installing...
Obiee11g System Session Variable
OBIEE - System session variables (reserved variables)

System session variables are session variables that the Oracle BI Server and Oracle BI Presentation Services use for specific purposes. System session variables have reserved names, that cannot be used...
Saw Object
OBIEE 11G - Impersonate

You can impersonate a user through two mechanisms: the act as functionality or the impersonate authentication through the saw Url The impersonate authentication takes place during a user authentication....
Card Puncher Data Processing
Python - Installation and configuration

Installation and configuration of a python environment. Download it and install it Example: Linux: Configuration: Path Third library installation: You can also install...

Share this page:
Follow us:
Task Runner