OBIEE - Security

Obi Edition

About

To determines who has the ability to view data and objects, you can combine several parameters configuration on different security levels:

  • Object Security: business logic security (repository) and catalog object security (presentation service),
  • Data Security: column (include in the business logic security) and row security (through repository filter dependent of the login)

The security process is made up of two sub-process:

  • authentication of the user. Is the user the right person ?
  • authorization of the user. Has the user the right to:
    • see this object (Object Permission on column, reports, …),
    • see this data (Data Permission),
    • perform this actions (Application Permission).

The security management in OBIEE is based on the use of this three variables :

Variable by security process:

Security Process USER PASSWORD GROUP Variables
Authentication x x
Object Authorization (and filter restriction) x x x

More … OBIEE 11G - Security

Documentation / Reference





Discover More
Bi Server Architecture With Client
OBIEE - BI Server (OBIS|nqsserver|nqs)

OBI Server is also known as: OBIS (Oracle Business Intelligence Server) or nqsserver (The process name) OBI Server is principally a query and analysis server software: that can integrate data...
Obiee Connection Pool
OBIEE - Connection Pool

This articles regroups all the articles and talk the connection pool features of the BI Server such as: the connection script tab ... see below 10G 11G To automate connection pool changes...
Obi Edition
OBIEE - Security (Level|Type)

security in Oracle BI can be classified broadly into the following three types. Data-level security Object-level security User-level security see Object-level security controls the visibility...
Obiee Database Request Subject Area
OBIEE 10G/11G - Direct Database Request

The Direct Database Request permit you to perform SQL statement directly to a datasource. The Oracle BI Server sends unprocessed, user-entered, physical SQL directly to an underlying database. The returned...



Share this page:
Follow us:
Task Runner