Authentication Scenarios for JPS-Based Security

Securing Oracle Reports Services 15-15 Reports Server delegates the job to an engine that accesses the data source, retrieves the data, and formats the report.

3. Report output is passed to Oracle HTTP Server

.

4. Report output is passed to the user

. The completed output is sent to the specified destination. Depending upon the destination, the output may be served back to the browser as shown in Figure 15–5 , sent to a printer, stored in a file for future reference, sent to an FTP server, and so on.

15.4.2 Additional Step When Using JPS for Authorization

Reports policies are granted to application roles. You must associate all users in your ID store embedded ID store of Oracle WebLogic Server or an external Oracle Internet Directory with one of the Reports application roles. You must add the oracle.security.jps.enterprise.user.class property in the jps-config-jse.xml file. In Enterprise Manager, you can complete this task as follows:

1. Navigate to the WebLogic Domain menu.

2. Choose Security Application Roles.

The Application Roles page is displayed. In this page, you can map users to application roles. Alternatively, you can complete this task by manually editing the DOMAIN_ HOMEconfigfmwconfigsystem-jazn-data.xml file. This step is required if you want to use JPS to authorize your users in Oracle Internet Directory. Search for the reports application in the XML file and add a user in the members section. For example, to add a user called orcladmin, add: member classweblogic.security.principal.WLSUserImplclass nameorcladminname member

15.4.3 Defining Security Policies for Reports

Out-of-the-box, default users, roles, and permissions are already created. As administrator, you can specify the reports to which a particular user has access by defining a security policy for each report. In the security policy, you can also specify the server, destination name desname, destination type destype, and other parameters. The security policy is checked when the user provides the user name and password.

15.4.3.1 Defining Security Policies for JPS-Based Security

Refer to Section 7.8.2, Defining Security Policies for Reports to use Oracle Enterprise Manager to update the report security policies.

15.4.3.2 Defining Security Policies for Portal-Based Security

For Portal-based security, you can create a security policy in Oracle Portal. For more information, see the Securing Oracle Portal in the Oracle Fusion Middleware Administrator’s Guide for Oracle Portal. 15-16 Publishing Reports to the Web with Oracle Reports Services

15.4.4 Defining Security Policies for Directories for JPS-Based Security

In certain cases, you will want to give a particular user access to multiple related reports. Rather than specify a security policy for each report, you can collect all the reports in a single directory, then specify a security policy for the directory. Again, the security policy is checked when the user provides the user name and password. Refer to Section 7.8.3, Defining Security Policies for Directories to use Oracle Enterprise Manager to update the directory security policies.

15.4.5 Defining Security Policies for Web Commands for JPS-Based Security

You can also specify the Oracle Reports Servlet rwservlet Web commands to which a particular userrole has access by creating security policies for each Web command. The security policy is checked when the user provides the user name and password. Refer to Section 7.8.4, Defining Security Policies for Web Commands to use Oracle Enterprise Manager to update the Web command security policies.

15.4.6 Defining ReadWrite Access to Directories

As administrator, you can specify readwrite access for Reports Server, Reports Application in-process Reports Server, or Oracle Reports Runtime to directories. This feature only checks whether the Reports Server, Reports Application in-process Reports Server, or Oracle Reports Runtime is authorized to read from or write to a specified directory, and is unrelated to the security policies for usersroles, which check the user name and password. Refer to Section 7.8.5, Defining ReadWrite Access to Directories to use Oracle Enterprise Manager to specify the readwrite permissions defined in the server configuration file rwserver.conf under the new optional element folderAccess .

15.4.7 Searching Application Policies in Enterprise Manager

Application policies are the authorization policies that an application uses for controlling access to its resources. You can enter search keyword for principals or permissions to query application security grants. You can use an application stripe to search if the application uses a stripe that is differerent from the name of the application. To search for application policies in Enterprise Manager, complete the following steps: 1. Log in to Enterprise Manager. 2. Navigate to the Reports Application home page.

3. From the Reports menu, select Security Application Policies.

The Application Policies page is displayed. 4. Check the Select Application Stripe to Search option. 5. In the drop-down menu, select reports.

6. In the Principal field, enter the name of the principal.

7. In the Permissions field, enter the permissions.

8. Click the right arrow button to search application security grants.