Searching for and Replacing a Simple Catalog Text String

Configuring and Managing the Oracle BI Presentation Catalog 17-33 For more information on the types of searches, see Oracle Fusion Middleware Users Guide for Oracle Business Intelligence Enterprise Edition. As the administrator, you must configure the use of the full-text catalog search. For this release, the full-text catalog search uses a crawler for Secure Enterprise Search. The full-text catalog search can index catalogs that contain translated text. Secure Enterprise Search limits each of its registered sources to a single locale. Therefore, a multilingual translated Oracle BI Presentation Catalog can be indexed only in a single language. The user interface for Secure Enterprise Search supports multiple languages.

17.11.2 Deployment of Oracle Full-Text Catalog Search

Figure 17–4 shows a deployment diagram for the full-text catalog search. This search runs as a separate service from Oracle BI Enterprise Edition and has its own port number and URL The WebLogic Server on which Secure Enterprise Search is hosted communicates with the index for SES and with the full-text catalog search. The search uses the Web Services of Oracle BI Enterprise Edition on its WebLogic Server for accessing the Oracle BI Presentation Catalog. The services on that WebLogic Server send the requests to the catalog. The full-text catalog search is deployed on the same WebLogic Server as Oracle BI EE. The instance for the full-text catalog search can be used with only one Oracle BI EE instance at a time. Multiple instances of Secure Enterprise Search can be connected to the same instance of the full-text catalog search. Figure 17–4 Deployment of the Full-Text Catalog Search 17.11.3 How is Security Handled in the Full-Text Catalog Search? The search engine enforces all the security that is defined on the Oracle BI content. Security for Oracle BI content can be defined at the object level, enforced through folder level security on the Oracle BI Server, and at the data level, enforced at run time or query time through user variables that are used to constrain the data.