Troubleshooting Configuring an LDAP Authentication Provider as the Single Source

Using Alternative Authentication Providers 3-35 authentication, they should consider auditing the RPD for the follow alternative methods of authentication. To Stop All Initialization Block Authentication Access: Stopping access through initialization blocks is a relatively simple process. This is done using the Administration Tool. In order for successful authentication to happen a user name is required. Initialization blocks do this by populating the special System Session Variable called USER. To stop all initialization block authentications you need to do the following. 1. Remove the System Variable USER from the RPD. 2. Ensure that initialization blocks in the RPD do not have the check box Required for authentication enabled. 3. Check that initialization blocks in the RPD that set the system session variables PROXY and especially PROXYLEVEL are not allowing users to bypass security. The system variables PROXY and PROXYLEVEL will allow users once connected to impersonate other users with their security profile. This is fine if the person Proxies to an account that has less privileges, but if they proxy to an account that has more privileges then this can be seen as a security issue. Caution: If you disable any initialization blocks, then any dependant initialization blocks will also be disabled. You can now be sure that any attempted access by using initialization block authentication will no longer be successful. However, you need to check all your initialization blocks.

3.4.2 Troubleshooting

If there is the error: Critical WebLogicServer BEA-000386 Server subsystem failed. Reason: weblogic.security.SecurityInitializationException: User oidweblogic is not permitted to boot the server. The server policy may have changed in such a way that the user is no longer able to boot the server. Reboot the server with the administrative user account or contact the system administrator to update the server policy definitions. Solutions: When you re-started your system did you start it as the new WebLogic administrator OID user oidweblogic? If you did and become locked out it is because that user weblogic in OID did not have the correct permission - It needs the Admin global role so ensure it has membership of a group in OID that is, Administrators that will have default membership to this role. Also ensure the BIAdministrators group, or its equivalent in OID, is added to the Admin global role. Note: If you are now locked out. To go back to a previous working configuration all you need to do is to restore the config.xml file. Therefore, to switch your configuration you just need to backup the file before changing the configuration then to switch back, you just restore one file for more information, see Task 1, Backup and Recovery . To restore the config.xml file, restart Oracle Business Intelligence as the original WebLogic admin user rather than the OID user. 3-36 Security Guide for Oracle Business Intelligence Enterprise Edition 4 Enabling SSO Authentication 4-1 4 Enabling SSO Authentication This chapter provides some general guidelines for configuring single sign-on SSO authentication for Oracle Business Intelligence. This chapter contains the following topics: ■ Section 4.1, SSO Configuration Tasks for Oracle Business Intelligence ■ Section 4.2, Understanding SSO Authentication and Oracle Business Intelligence ■ Section 4.3, SSO Implementation Considerations ■ Section 4.4, Configuring SSO in an Oracle Access Manager Environment ■ Section 4.5, Configuring Custom SSO Environments ■ Section 4.6, Using Fusion Middleware Control to Enable SSO Authentication

4.1 SSO Configuration Tasks for Oracle Business Intelligence

Table 4–1 contains SSO authentication configuration tasks and provides links for obtaining more information. Note: For a detailed list of security setup steps, see Section 1.8, Detailed List of Steps for Setting Up Security In Oracle Business Intelligence . Note: Oracle recommends using Oracle Access Manager as an enterprise-level SSO authentication provider with Oracle Fusion Middleware 11g. Sections 4.2, 4.3, and 4.4 assume that Oracle Access Manager is the SSO authentication provider. Section 4.5 references alternative authentication providers in custom SSO environment solutions. For more information about configuring and managing Oracle Access Manager with Oracle Fusion Middleware, see Configuring Single Sign-On in Oracle Fusion Middleware in Oracle Fusion Middleware Application Security Guide. For more information about supported SSO providers, see System Requirements and Certification .