Creating Secure Report Queries Using an External Report Generator
8.5.9.8 EnablingDisabling Security Checks for Report Queries
If the security checks preference variable is enabled, and a secure version of a query exists in the contenttrackerreports_query.htm file, then Content Tracker Reports will use the secure query to generate the requested report. However, you may decide that certain reports do not need to be generated using security checks. Accordingly, you can selectively disable the secure version of any report query. To disable security checks account matching for particular report queries:1. In a text editor, open the contenttrackerreports_query.htm file:
IntradocDircustomContentTrackerReportsresourcescontenttrackerreports_ query.htm2. Locate the secure version of the query that you want to disable.
3. Rename the query. For example, if you want to disable the qSctrUsersByType_SEC
query, you can add the suffix _disabled to the query name: qSctrUsersByType_SEC_disabled Renaming the query ensures that the Content Tracker Reports service can not find the secure query in the contenttrackerreports_query.htm file. Instead, the non-secure version qSctrUsersByType will be used.4. Save and close the contenttrackerreports_query.htm file.
5. Restart the Content Server to apply the changes.
8.5.9.9 Creating Secure Report Queries
For most of the pre-defined report queries, there are both non-secure and secure versions in the contenttrackerreports_query.htm file. Optionally, you can create a secure version for any query that does not currently have one. In particular, this includes any non-secure custom queries that you have added. To create a secure version of a non-secure report query: 1. In a text editor, open the contenttrackerreports_query.htm file: IntradocDircustomContentTrackerReportsresourcescontenttrackerreports_ query.htm 2. Locate the query for which you want to create a secure version. For consistency, you should add your secure query immediately following the corresponding non-secure version. 3. Design your secure SQL report query: It might be helpful to review Step 2 in the procedure for Creating Custom Report Queries on page 8-70. Note: Renaming a secure query is a temporary disabling solution. Later, if you decide that you prefer to use the secure version of a query, you can easily re-enable it by restoring its original name. Alternatively, you can delete the secure version of the query. However, if you subsequently reconsider, you would need to recreate the entire secure version of the query. 8-74 Application Administrators Guide for Content Server 4. Adjust your query to ensure that it follows the pattern of the existing secure queries: a. In the FROM clause, include the Revisions table. b. In the WHERE clause, include the SCTR_SECURITY_CLAUSE token. This acts as a placeholder for the WHERE clause that the Content Tracker Reports service inserts. c. Complete the query following the established pattern in the existing secure queries. The Figure 8–4 illustrates a typical report query pairing. 5. Save and close the contenttrackerreports_query.htm file. 6. Restart the Content Server to apply the changes. Figure 8–4 Examples of Non-Secure and Secure Report Query Versions8.5.9.10 Using an External Report Generator
To generate custom reports from an external reporting tool:1. Open the external reporting tool application
Parts
» Oracle Fusion Middleware Online Documentation Library
» About Native File Conversion Identifying MIME Types
» About Custom Fields Managing Content Fields
» Changing the Default Sort Order of the Opening Query
» About Managed Links Managing Linked Content with Link Manager
» Configuring Link Manager Managing Linked Content with Link Manager
» Managing Links Managing Linked Content with Link Manager
» Link Manager Database Tables
» Link Manager Filters Managing Linked Content with Link Manager
» Site Studio Integration Managing Linked Content with Link Manager
» Click Go located next to the Abort refresh activity option. The refresh activity
» About DCLs and Metadata Schemas
» About Content Profiles Using Profiles to Customize Content Screens
» Content Profile Rules Using Profiles to Customize Content Screens
» Click OK. Oracle Fusion Middleware Online Documentation Library
» Select the Is global rule with priority check box. You can optionally change the
» On the Conditions tab, click Add. Click OK. Click OK. Click OK. Click OK.
» Workflow Overview Introduction to Workflows
» Workflow Steps Introduction to Workflows
» Workflow Step Evaluation Process
» Pre-design Questions Planning a Workflow
» Designing a Workflow Modifying Workflows
» Criteria Workflow Process Creating a Criteria Workflow
» Basic Workflow Process Creating a Basic Workflow
» Idoc Script Functions and Variables
» About Jumps Customizing Workflows
» Jump Variables and Steps Setting Up Jumps
» Jump Examples Customizing Workflows
» Scenario 1: Criteria Workflow Workflow Scenarios
» Scenario 2: Tokens Scenario 3: Jump Based on Metadata Scenario 4: Time-Dependent Jump
» Acquiring a Digital Signature Setting Up Parallel Workflows
» Adding Ad Hoc Step Users Customizing Criteria Workflow Emails
» Paste the following code into the entry event of your workflow step. Note that
» Other Customizations Workflow Tips and Tricks
» Searching Within a Workflow Step Suppressing Workflow Notifications
» Workflow Item Stuck in EDIT or GENWWW Status
» Workflow Item Entered in Wrong Workflow
» About PDF Watermark How PDF Watermark Works
» Folders Overview Usage Scenarios
» Folders Structure Naming Folders Folders Component Security
» Folder Metadata Inheritance Trash Bin Metadata Propagation
» Folder Content Item Revisions
» Folder Archiving Folder Searching URL-Mapped Folders
» About WebDAV What is WebDAV?
» WebDAV Clients WebDAV Architecture
» Preventing Folder Static Inheritance for Specific Metadata Fields
» Optimizing System Performance Click OK.
» Virtual Folders Configuring WebDAV
» Other Issues Click OK twice to save the settings and close the Internet Options screen.
» Adding Custom Viewers and Renderers
» Content Tracker Summary About Content Tracker Components and Functions
» Content Tracker Reports Summary Data Recording Overview
» Data Reduction Overview Data Reporting Overview Content Tracker Terminology
» General Limitations General Considerations
» Data Collection and Processing
» Data Collection Operational Overview
» Data Reduction Operational Overview
» Data Output Operational Overview
» Tracking Limitations Operational Overview
» Data Reduction Features Data Tracking Functions
» Activity Snapshots Data Tracking Functions
» Service Calls Data Tracking Functions
» Web Beacon Objects Data Tracking Functions
» Click the Snapshot tab. Click OK. Open the Content Tracker Administration page: Click OK.
» Oracle and DB2 Case Sensitivity Access Control Lists and Content Tracker Reports Secure Mode
» Pre-Defined Reports Report Generation
» Custom Reports External Report Generator
» User AuthenticationAuthorization and Auditing Site Studio Web Site Activity Reporting
» Security Checks and Query Results
» Accessing Drill Down Reports Accessing Reports from the Information Page
» Creating Custom Report Queries
» Creating Secure Report Queries Using an External Report Generator
» About the Service Call Configuration File
» About the Content Tracker Logging Service
» Managing Service Call Information
» Configuration Variables Configuration and Customization
» Activity Metrics SQL Queries
» Web Server Filter Debugging Support Java Code Debugging Support DataBinder Dump Facility
» Search Rules About Content Categorizer
» XML Conversion About Content Categorizer
» Configuration Variable Setting Up Content Categorizer
» Understanding Search Rules Search Rules
» Pattern Matching Search Rules
» Abstract Search Rules Search Rules
» Categorization Engine Search Rule Filetype Search Rule
» Translation Transformation Using XSLT Stylesheets
» SearchML Transformation XSLT Transformation
» Flexiondoc Transformation XSLT Transformation
Show more