Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Oracle Business Intelligence Enterprise Edition 12c

You're reading from   Oracle Business Intelligence Enterprise Edition 12c Build your organization's Business Intelligence system

Arrow left icon
Product type Paperback
Published in Apr 2017
Publisher Packt
ISBN-13 9781786464712
Length 578 pages
Edition 2nd Edition
Arrow right icon
Authors (2):
Arrow left icon
Adrian Ward Adrian Ward
Author Profile Icon Adrian Ward
Adrian Ward
Haroun Khan Haroun Khan
Author Profile Icon Haroun Khan
Haroun Khan
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Preface 1. Oracle BI 12c Architecture FREE CHAPTER 2. Installing the Prerequisite Software 3. Installing on Windows Server 2012 4. Reviewing the Features of the Reporting Repository 5. Installing and Configuring Client Tools 6. Understanding the Systems Management Tools 7. Developing the BI Server Repository 8. Creating Dashboards and Analyses 9. Agents and Action Framework 10. Developing Reports Using BI Publisher 11. Usage Tracking 12. Improving Performance 13. Using the BI Admin Change Management Utilities 14. Ancillary Installation Options 15. Reporting Databases 16. Customizing the Style of Dashboards 17. Upgrading to 12c

Security Realms


Management of the over arching system security will take place in the Security Realms area. A Security Realm is basically a configuration area to manage how WLS resources are protected. This is where you configure users, groups, and other security profiles that determine how access to applications deployed on the WLS server and the WLS administration console itself is achieved. More than one Security Realm can exist, but only one can be used as the active realm from which the security configuration for the application server is sourced. Thus, during the Oracle BI installation configuration, only one Security Realm, myrealm, is created. It is within this realm that we will configure and manage authentication providers such as a company's LDAP directory and so on.

Tip

Note that WLS itself contains an Embedded LDAP directory. This is also referred to as the DefaultAuthenticator. It follows the open standard LDAP v3 protocol, and could indeed support custom build directories for...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime