Select Discoverer Plus in the Components area to display the Fusion Middleware Display Fusion Middleware Control and navigate to the Discoverer Plus Select the Default option from the Communication Protocols options. Click Apply to save the details. Choos

13-10 Oracle Fusion Middleware Configuration Guide for Oracle Business Intelligence Discoverer Note : If you deploy Discoverer Plus over HTTPS, end users must use an HTTPS URL. If they use an HTTP URL, Discoverer does not start for more information about troubleshooting HTTPS problems, see Section E.8, Discoverer Plus reports RMI error . 13.6.3.2 How to display Communications Protocols on the Discoverer Plus Configuration page in Fusion Middleware Control You use the Discoverer Plus Configuration page in Fusion Middleware Control to specify a Discoverer Plus communication protocol. For example, if you want to encrypt Discoverer Plus data, you might want to configure Discoverer Plus to use the HTTPS communication protocol. To display the Discoverer Plus communication protocols in Fusion Middleware Control: 1. Display the Fusion Middleware Control Discoverer Home page for more information, see Section 4.1.3, How to display the Fusion Middleware Control Discoverer Home page and Discoverer component Home pages .

2. Select Discoverer Plus in the Components area to display the Fusion Middleware

Control Discoverer Plus Home page. Maintaining Security with Oracle BI Discoverer 13-11

3. Click Configure to display the Discoverer Plus Configuration page.

13.6.3.3 How to set up Discoverer Plus to use the Default communication protocol

To set up Discoverer Plus to use the Default communication protocol:

1. Display Fusion Middleware Control and navigate to the Discoverer Plus

Communication Protocols area in the Discoverer Plus Configuration page for more information, see Section 13.6.3.2, How to display Communications Protocols on the Discoverer Plus Configuration page in Fusion Middleware Control .

2. Select the Default option from the Communication Protocols options.

3. Click Apply to save the details.

4. Give Discoverer Plus users the URL of the Discoverer servlet:

For example, http:host.domain:80discovererplus The Discoverer Plus applet attempts to use JRMP. If JRMP is not available, the Discoverer Plus applet uses HTTP or HTTPS depending on the URL to communicate with the Discoverer servlet. 13-12 Oracle Fusion Middleware Configuration Guide for Oracle Business Intelligence Discoverer Note: This option works regardless of whether the applet is running inside or outside a firewall. However, it is slower outside the firewall because JRMP is tried first. For more information about the other options on this page, refer to Section 13.6.3.1, About specifying a Discoverer Plus communication protocol .

13.6.3.4 How to set up Discoverer Plus to use the Tunneling communication protocol

You use the Tunneling option when you want to run Discoverer Plus over HTTP. To set up Discoverer Plus to use the Tunneling communication protocol: 1. Display Fusion Middleware Control and navigate to the Discoverer Plus Communication Protocols area in the Discoverer Plus Configuration page for more information, see Section 13.6.3.2, How to display Communications Protocols on the Discoverer Plus Configuration page in Fusion Middleware Control .

2. Choose the Tunneling option from the Communication Protocols options.

3. Click Apply to save the details. 4. optional If you are using a firewall, open the appropriate port in the firewall to accept HTTP or HTTPS traffic as appropriate. 5. Give Discoverer Plus users the URL of the Discoverer servlet: For example, http:host.domain:80discovererplus The Discoverer Plus applet uses the same protocol to communicate with the Discoverer servlet as was originally used to download the applet itself that is, either HTTP or HTTPS. This option works regardless of whether a firewall is being used.

13.6.3.5 How to set up Discoverer Plus to use the Secure Tunneling communication protocol

You use the Secure Tunneling option when you want to run Discoverer Plus over HTTPS. To set up Discoverer Plus to use the Secure Tunneling communication protocol: 1. Display Fusion Middleware Control and navigate to the Oracle BI Discoverer Plus Communication Protocols area in the Discoverer Plus Configuration page for more information, see Section 13.6.3.2, How to display Communications Protocols on the Discoverer Plus Configuration page in Fusion Middleware Control .

2. Choose the Secure Tunneling option from the Communication Protocols options.

3. Click Apply to save the details. 4. optional If you are using a firewall, open the appropriate port in the firewall to accept HTTP or HTTPS traffic as appropriate. 5. Give Discoverer Plus users the URL of the Discoverer servlet: For example, https:host.domain:4443discovererplus The Discoverer Plus applet uses the HTTPS protocol to communicate with the Discoverer servlet. When a Discoverer end user starts Discoverer Plus for the first time on a client machine, they are prompted to confirm that they want to accept a default security certificate. Before selecting the Yes option on the Security Alert dialog, the Discoverer end user must install a Discoverer Plus security certificate on the client machine for Maintaining Security with Oracle BI Discoverer 13-13 more information, see Section 2.5.1, How to install a security certificate on a Discoverer Plus client machine .

13.7 Configuring End-to-End Secure Sockets Layer for Discoverer

If you have Oracle HTTP Server and Oracle Web Cache front-ending the Oracle WebLogic Server that hosts Oracle BI Discoverer, then to enable end-to-end Secure Sockets Layer SSL you must perform these steps: 1. Enable SSL for OracleAS Single Sign-On. For more information, see Enabling SSL for the Single Sign-on Server . 2. Enable SSL for the Oracle Web Cache end points. To enable inbound and outbound SSL for Web Cache, follow the procedures described in the section Enabling SSL for Oracle Web Cache Endpoints in Oracle Fusion Middleware Administrators Guide. 3. Enable SSL for the Oracle HTTP Server virtual hosts. To enable inbound and outbound SSL for Oracle HTTP Server virtual hosts, follow the procedures described in the section Enabling SSL for Oracle HTTP Server Virtual Hosts in Oracle Fusion Middleware Administrators Guide. 4. If OracleAS Single Sign-On is enabled, modify the virtual host configuration. For more information, see Modifying the Virtual Host Configuration . 5. Re-register the partner applications with the SSO server as described in the section Re-registering mod_osso . 6. Enable the WebLogic Plug-in parameter. For more information, see Enabling WebLogic Plug-In . Enabling SSL for the Single Sign-on Server To manually configure SSL, refer to the information on enabling SSL in the Oracle Application Server Single Sign-On Administrators Guide. If you are going to configure OracleAS Single Sign-On behind a reverse proxy server, you should refer to the information on deploying OracleAS Single Sign-On with a proxy server, in the Oracle Application Server Single Sign-On Administrators Guide at: http:download.oracle.comdocscdB28196_ 01idmanage.1014b15988toc.htm Modifying the Virtual Host Configuration If you are using SSL connections, then add the ServerName entry in the ssl.conf file of the Oracle HTTP Server virtual host and specify the Oracle Web Cache listening port as follows: 1. Open the Oracle HTTP Server home page in the Oracle Enterprise Manager 11g Fusion Middleware Control, select Administration, and then Advanced Configuration . Note: As the OracleAS Single Sign-On middle-tier partner application is still non-SSL, you must re-register it as non-SSL. Therefore, the re-registration of mod_osso needs to specify the non-SSL URL of the OracleAS Single Sign-On middle tier for the mod_ osso_url parameter to ssoreg. Refer to the information on registering mod_osso in the Oracle Application Server Single Sign-On Administrators Guide.