Oracle Bi Plus Pocket Guide

Embed Size (px)

Citation preview

  • 8/14/2019 Oracle Bi Plus Pocket Guide

    1/2

    Subject areas can be built by dragging Facts

    and Dimensions from Business Models. Many

    Subject Areas can be built from a Business

    Model, but each Subject Area can only be from

    one and only one Business Model.

    A Consistency Check is performed by default

    when a Repository is saved. Consistency Check

    will ensure there are no errors in the Repository.

    Consistency check can also be performed

    manually, File Menu Check Global

    Consistency for the entire Repository or Right-

    Click on the Business Model to check just the

    Model.

    Locks on a Repository File during save can be

    released, by shutdown and re-start of the BI

    Server service.

    Security Management

    Authentication Provides application Access.

    Supports Lightweight Directory Access Protocol

    (LDAP), Siebel Analytics Repository

    authentication (Default method used for

    authentication), Microsoft Active Directory

    (ADSI), and External Database authentication.

    Authorization provides permissions and

    privileges to view Reports, Data, create Folders,

    iBots, Manage Privileges, Create Views, etc.

    Security is enforced on two levels:

    Object-level security controls access to

    Metadata Repository objects (configured in

    Administrator Tool), and Web Catalog objects

    such as Folders, Filters, and Dashboards, etc.

    (configured in BI Answers Web Application).

    Data-level security controls access to content

    and data in end-user Reports and Dashboards

    (configured in Administrator Tool).

    Administrator Tool Manage Menu item

    Security Manager is used to define Users and

    User Groups and define Repository permissions.

    Data-level permissions can be set to above

    Groups and Users from the Presentation Table

    properties dialog box of each Subject area.

    BI Answers Web Page, Settings Menu

    Administration, to view and administer privileges

    associated with various components of the

    Answers Web application.

    Bypassing Security

    In the security section of the NQSConfig.ini file,

    uncomment

    AUTHENTICATION_TYPE=BYPASS_NQS

    save, re-start BI Server service.

    Setting Query Limits

    Administrator Manage Security ManagerGroups Permissions Query Limits tab.

    Options:

    Enable: Enforces restriction and cancels the

    query

    Warn: Logs message in NQServer.log and

    NQQuery.log if row limit is reached

    Ignore: Limits will be inherited from the parent

    groups. If there is no row limit to inherit, does not

    enforce limit

    Disabling Query Functionality

    Administrator Manage Security Manager

    Groups Permissions Query Limits tab

    Restrict box (for production tasks & updates).

    Recommended Books and Related SitesThe Data Warehouse Lifecycle Toolkit by RalphKimball, Margy Ross, Warren Thornthwaitehttp://www.oracle.com/technology/documentation/bi_ee.html - Documentation site for OBIEEhttp://www.oracle.com/technology/obe/obe_bi/bi_e

    e_1013/index.html - OBIEE Tutorial

    http://www.oracle.com/technology/documentation/bi_apps.html - Oracle BI Applications

    Revision 200709

    Oracle Business Intelligence

    Enterprise Edition Plus (OBIEE)

    Server Architecture

  • 8/14/2019 Oracle Bi Plus Pocket Guide

    2/2