Select Manage, then select Identity. In the Identity Manager dialog, in the tree pane, select BI Repository. In the Application Role dialog, click Permissions. Click OK, then click OK again to return to the Identity Manager.
2. Select Manage, then select Identity.
3. In the Identity Manager dialog, in the tree pane, select BI Repository.
4. In the right pane, select the Application Roles tab, then double-click the application role for which you want to set object permissions. Note that if you are in offline mode, no application roles appear in the list unless you have first modified them in online mode. See About Applying Data Access Security in Offline Mode for more information.5. In the Application Role dialog, click Permissions.
13-10 Metadata Repository Builders Guide for Oracle Business Intelligence Enterprise Edition 6. In the UserApplication Role Permissions dialog, in the Object Permissions tab, select an object by performing one of the following steps: ■ Click the Add button. Then, browse to locate the object you want, select it, and then click Select. ■ Click the Name field for an empty row. Then, browse to locate the object you want, select it, and then click Select. 7. Assign the appropriate permission for each object. You can choose one of the following options: ■ Read: Only allows read access to this object. ■ ReadWrite: Provides both read and write access to this object. ■ No Access: Explicitly denies all access to this object.8. Click OK, then click OK again to return to the Identity Manager.
About Permission Inheritance for Users and Application Roles Users can have explicitly granted permissions. They can also have permissions granted through membership in application roles, that in turn can have permissions granted through membership in other application roles, and so on. Permissions granted explicitly to a user have precedence over permissions granted through application roles, and permissions granted explicitly to the application role take precedence over any permissions granted through other application roles. If there are multiple application roles acting on a user or application role at the same level with conflicting security attributes, the user or application role is granted the least restrictive security attribute. Any explicit permissions acting on a user take precedence over any permissions on the same objects granted to that user through application roles. Filter definitions, however, are always inherited. For example, if User1 is a member of Role1 and Role2, and Role1 includes a filter definition but Role2 does not, the user inherits the filter definition defined in Role1. Note that you should always define object permissions for application roles rather than for individual users. Example 13–1 Permission Inheritance 1 You might have a user User1 who is explicitly granted permission to read a given table TableA. Suppose also that User1 is a member of Role1, and Role1 explicitly denies access to TableA. The resultant permission for User1 is to read TableA, as shown in Figure 13–5 . Because permissions granted directly to the user take precedence over those granted through application roles, User1 has the permission to read TableA. Applying Data Access Security to Repository Objects 13-11 Figure 13–5 User Permissions and Application Role Permissions Example 13–2 Permission Inheritance 2 Consider the situation shown in Figure 13–6 . Figure 13–6 Permissions Example These are the resulting permissions: ■ User1 is a direct member of Role1 and Role2, and is an indirect member of Role3, Role4, and Role5. ■ Because Role5 is at a lower level of precedence than Role2, its denial of access to TableA is overridden by the READ permission granted through Role2. The result is that Role2 provides READ permission on TableA. ■ The resultant permissions from Role1 are NO ACCESS for TableA, READ for TableB, and READ for TableC. ■ Because Role1 and Role2 have the same level of precedence and because the permissions in each cancel the other out Role1 denies access to TableA, Role2 allows access to TableA, the less restrictive level is inherited by User1. In other words, User1 has READ access to TableA. ■ The total permissions granted to User1 are READ access for TableA, TableB, and TableC. 13-12 Metadata Repository Builders Guide for Oracle Business Intelligence Enterprise Edition Setting Query Limits You can manage the query environment by setting query limits governors in the repository for particular application roles. You can limit queries by the number of rows received, by maximum run time, and by restricting to particular time periods. You can also allow or disallow direct database requests or the Populate privilege. You should always set query limits for particular application roles rather than for individual users. This section contains the following topics: ■ Accessing the Query Limits Functionality in the Administration Tool ■ Limiting Queries By the Number of Rows Received ■ Limiting Queries By Maximum Run Time and Restricting to Particular Time Periods ■ Allowing or Disallowing Direct Database Requests ■ Allowing or Disallowing the Populate Privilege Accessing the Query Limits Functionality in the Administration Tool Follow the steps in this section to access the Query Limits tab of the UserApplication Role Permissions dialog. To access the query limits functionality in the Administration Tool for a particular application role: 1. Open your repository in the Administration Tool.2. Select Manage, then select Identity.
Parts
» Oracle Fusion Middleware Online Documentation Library
» Click OK when you are finished setting preferences.
» Select Set Icon. Oracle Fusion Middleware Online Documentation Library
» Select the appropriate DSN and click OK.
» Click OK. Oracle Fusion Middleware Online Documentation Library
» Without opening a repository, select File Multiuser History.
» In the ODBC Data Source Administrator dialog, click the System DSN tab, and
» In the Select Data Source screen, in the Connection Type field, select the type of
» Click Finish. Oracle Fusion Middleware Online Documentation Library
» In the Administration Tool, select File, then select Import Metadata.
» Provide the Data source name for the primary database. Click OK.
» In the Select Data Source screen, select OracleADF_HTTP for Connection Type.
» Select the objects you want to import in the Available list and move them to the Click Finish.
» In the Database dialog, click the Features tab. In the Features tab, use the information in
» Specify or adjust the properties as needed, then click OK.
» In the Persist connection pool area, click Clear. Click OK.
» To add tables to the display folder, click Add. Then, in the Browse dialog, select Click OK.
» Click OK in the Hierarchy dialog.
» Select View Members. Click Query to display results. When finished, click Close.
» Click OK. Select Create Columns for Alias Table. Then, from the sub-list, select the alias
» Type the text of the hint in the Hint field and click OK.
» In the shortcut menu, select Update Row Count. Click Yes to check out the objects.
» If you want to provide a dynamic list of currency options, create a table in your
» Click OK. Click OK or Cancel to close the Dimensions dialog.
» From the right-click menu, select Create Logical Dimension, then select either
» In the Check Out Objects dialog, click Yes to check out the objects that appear in
» If the values for the source are unique, select the option Select distinct values.
» Click OK. To move a table, in the Name list, select the table you want to reorder. Then, use
» In the Finish Script screen, the complete path and file name appears. Click Finish.
» Click OK, then click OK again to return to the Identity Manager.
» On the General tab, in the Data source definition: Database field, ensure that the
» Click OK. Open the user.sh file. You can find this file at:
» Click Select next to Patch File. Browse to select the patch file you want to apply, Click Finish.
» Select Tools, then select Query Repository. Click Query.
» When you have finished mapping columns between the selected physical tables, Click Finish.
» In the Choose Directory dialog, click Browse to locate and select the location Click OK.
» To remove the selected objects, click Yes.
» Repository initialization blocks only In the Schedule area, select a start date and
» In the [Repository|Session] Variable Initialization Block dialog, click Edit Data
» Click Edit Data Target. Click OK.
» Check out the branch project using File Multiuser Checkout. You can check
Show more