High Level Steps for Configuring Alternative Authentication Providers
3-2 Security Guide for Oracle Business Intelligence Enterprise Edition
Roles for example, BIConsumer, BIAuthors, and BIAdministrator, and any additional Application Roles that you create. For more information about assigning users and
groups to Application Roles, see Section 2.4, Creating and Managing Application
Roles and Application Policies Using Fusion Middleware Control .
You continue to use the other Oracle Business Intelligence tools i.e. the Oracle BI Administration Tool, Fusion Middleware Control, and the Administration Page in
Analytics to manage the other areas of the security model.
For a current list of supported authentication providers and directory servers to use with Oracle Business Intelligence, you select the authentication provider from the
Type list in the Create a New Authentication Provider page. For more information,
see System Requirements and Certification
. You can configure more than one supported authentication provider for more
information, see Section 3.2.3.3, Configuring Oracle Business Intelligence to use
Multiple Authentication Providers .
If a directory server other than the default WebLogic LDAP Server is being used, you can view the users and groups from that directory server in Oracle WebLogic Server
Administration Console. However, you must continue to manage the users and groups in the interface for the directory server being used. For example, if you are using OID,
you must use OID Console to create and edit users and groups.
This topic contains the following sections:
■
Section 3.2.1, High Level Steps for Configuring Alternative Authentication Providers
■
Section 3.2.2, Prerequisites for Using Alternative Authentication Providers
■
Section 3.2.3, Configuring Oracle Business Intelligence To Use Alternative Authentication Providers
■
Section 3.2.4, Configuring User And Group Name Attributes In The Identity Store
■
Section 3.2.5, Configuring the GUID Attribute in the Identity Store
■
Section 3.2.6, Configuring a New Trusted User BISystemUser
■
Section 3.2.7, Regenerating User GUIDs