About Discoverer and security
13.1 About Discoverer and security
Discoverer uses and must therefore protect different sensitive resources, including: ■ Data for example, users must only see information they are allowed to see ■ Metadata for example, users must not be able to edit workbooks to which they do not have access ■ Discoverer connections for example, database login details must not be transmitted or persisted without being securely encrypted ■ System resources for example, CPU, memory ■ Network resources or more precisely, the protection of data as it is transmitted across a network The table below shows the sensitive resources used and protected by the different Discoverer components: 13-2 Oracle Fusion Middleware Configuration Guide for Oracle Business Intelligence Discoverer Discoverer uses several security mechanisms to prevent unauthorized access to the above resources. These security mechanisms are provided by the following security models: ■ Database security model ■ Discoverer EUL security model ■ Oracle Applications security model ■ Oracle Fusion Middleware Security model The diagram below shows the multiple security mechanisms employed by Discoverer, all of which ultimately protect data and system resources from unauthorized access: The security mechanisms that Discoverer employs depend on the category of Discoverer user as defined by the Discoverer product they are using, as follows: ■ Discoverer Plus, Discoverer Viewer, and Discoverer Portlet Provider users that is, Discoverer end users ■ Oracle BI Discoverer Administrator users that is, Discoverer managers ■ users administering Discoverer using Fusion Middleware Control that is, Discoverer middle-tier administrators The table below shows the security models are used by Discoverer components: Sensitive resource Used and protected by Discoverer Plus Used and protected by Discoverer Viewer Used and protected by Discoverer Portlet Provider Used and protected by Discoverer Administrator Used and protected by Discoverer pages in Fusion Middleware Control Data Yes Yes Yes Yes Not used Metadata Yes Yes Yes Yes Yes Discoverer connections Yes Yes Yes Not used Yes System resources Yes Yes Yes Yes Yes Network resources Yes Yes Yes Yes Yes Maintaining Security with Oracle BI Discoverer 13-313.2 About Discoverer and the database security model
Parts
» Oracle Fusion Middleware Online Documentation Library
» What is Oracle BI Discoverer?
» About Discoverer installations that are associated with Oracle Internet Directory and schemas
» How to confirm an Oracle BI Discoverer installation
» About connecting to Discoverer What is the Oracle BI Discoverer architecture?
» About the Discoverer Java EE applications
» About the Discoverer CORBA components
» About the Discoverer database tier Oracle BI Discoverer Navigation
» Display Trusted Certificates from the Certificate type drop down list if it is not Click Apply.
» About running Discoverer Plus over HTTP for the first time on a client machine
» How to start Discoverer Plus
» How to modify the URL that starts Discoverer
» What are the types of Discoverer connections?
» How to create public connections
» What happens when you start Discoverer servlets? What happens when you stop Discoverer servlets?
» What happens when you enable and disable Discoverer client-tier components
» What is the Discoverer Catalog? What is the OLAP Catalog?
» Characteristics of the folder structure of the Discoverer Catalog? Folders in the structure
» Types of privileges for objects and folders Managing privileges as the D4OSYS user
» Go to the Fusion Middleware Control Discoverer Home page.
» Customizing the look and feel of Discoverer Plus OLAP Information to be provided to end users
» Forms of output from the utility Description of output from the utility
» URL parameters for the Discoverer Plus OLAP
» Discoverer topology with a single instance Discoverer topology with multiple instances
» About providing load balancing
» About using Fusion Middleware Control to manage multiple machines
» What are the benefits of Oracle Web Cache? How does Oracle Web Cache work?
» In the Components area, click Discoverer Viewer in the Name column. Click Customize.
» How to improve Discoverer performance by using worksheets and page items appropriately
» How to set the log level for Discoverer component loggers How to copy Discoverer log files
» List of URL parameters specific to Discoverer Plus
» List of URL parameters specific to Discoverer Viewer
» About Discoverer and security
» About Discoverer and the Oracle Applications security model
» Configuring End-to-End Secure Sockets Layer for Discoverer
» Using Discoverer with Oracle Single Sign-On
» Using Discoverer with Oracle Access Manager
» Introducing Virtual Private Databases, Single Sign-On, and Discoverer
» Example for using GUID or SSO user name to limit Discoverer data
» How to use the eul_triggerpost_login trigger
» What is a firewall? What is a demilitarized zone DMZ?
» What is HTTPS and why should I use it? How do I configure Discoverer to work in an intranet
» About Discoverer connections and Oracle e-Business Suite
Show more