Reports Server authenticates the user that is, verifies the user name and

Securing Oracle Reports Services 15-15 Reports Server delegates the job to an engine that accesses the data source, retrieves the data, and formats the report.

3. Report output is passed to Oracle HTTP Server

.

4. Report output is passed to the user

. The completed output is sent to the specified destination. Depending upon the destination, the output may be served back to the browser as shown in Figure 15–5 , sent to a printer, stored in a file for future reference, sent to an FTP server, and so on.

15.4.2 Additional Step When Using JPS for Authorization

Reports policies are granted to application roles. You must associate all users in your ID store embedded ID store of Oracle WebLogic Server or an external Oracle Internet Directory with one of the Reports application roles. You must add the oracle.security.jps.enterprise.user.class property in the jps-config-jse.xml file. In Enterprise Manager, you can complete this task as follows:

1. Navigate to the WebLogic Domain menu.

2. Choose Security Application Roles.

The Application Roles page is displayed. In this page, you can map users to application roles. Alternatively, you can complete this task by manually editing the DOMAIN_ HOMEconfigfmwconfigsystem-jazn-data.xml file. This step is required if you want to use JPS to authorize your users in Oracle Internet Directory. Search for the reports application in the XML file and add a user in the members section. For example, to add a user called orcladmin, add: member classweblogic.security.principal.WLSUserImplclass nameorcladminname member

15.4.3 Defining Security Policies for Reports

Out-of-the-box, default users, roles, and permissions are already created. As administrator, you can specify the reports to which a particular user has access by defining a security policy for each report. In the security policy, you can also specify the server, destination name desname, destination type destype, and other parameters. The security policy is checked when the user provides the user name and password.

15.4.3.1 Defining Security Policies for JPS-Based Security

Refer to Section 7.8.2, Defining Security Policies for Reports to use Oracle Enterprise Manager to update the report security policies.

15.4.3.2 Defining Security Policies for Portal-Based Security

For Portal-based security, you can create a security policy in Oracle Portal. For more information, see the Securing Oracle Portal in the Oracle Fusion Middleware Administrator’s Guide for Oracle Portal.