Book Image

Oracle BAM 11gR1 Handbook

By : Pete Wang
Book Image

Oracle BAM 11gR1 Handbook

By: Pete Wang

Overview of this book

An integral component of Oracle SOA and BPM Suite, Oracle BAM (Business Activity Monitoring) ultimately empowers business executives to react quickly to changing business situations. BAM enables business service and process monitoring through real-time data streaming and operational reports, and this book helps you to take advantage of this vital tool with best practice guidance for building a BAM project."Oracle BAM 11gR1 Handbook" is an essential companion for advancing your BAM knowledge, with troubleshooting and performance tuning tips to guide you in building BAM applications. The book uses step-by-step instructions alongside a real world demo project to steer you through the pitfalls of report and application development. Packed with best practices, you'll learn about BAM migration, HA configuration and much more."Oracle BAM 11gR1 Handbook" comprises a myriad of best practices for building real-time operational dashboards, reports and alerts. The book dives straight into the architecture of Oracle BAM 11g, before moving swiftly onto concepts like managing BAM server securities, populating Data Objects and performing load testing. Later on you'll also learn about BAM migration and building an ADF-based report, plus much more that you won't want to miss. For focusing in on best practices for this integral tool within Oracle SOA and BPM Suite, "Oracle BAM 11gR1 Handbook" is the perfect guide for the job.
Table of Contents (18 chapters)
Oracle BAM 11gR1 Handbook
Credits
Foreword
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface

Managing BAM authorization


Authorization is the process of determining what permissions a user can have when accessing protected resources. Oracle BAM uses the policy-based mechanism to achieve authorization. In this section, you will learn how to manage BAM authorization, in particular, how to manage application roles and policies.

Managing application roles

An application role is a virtual group defined in a centralized policy store, which is typically mapped to certain permissions that control the access of protected application resources. An application role contains members that can be users or groups defined in an LDAP Server, or another application role.

Note

Granting permissions to application roles instead of physical users or groups, allows you to decouple the application-level permissions with principals defined in an identity store. Using application roles provides flexibility and ease of management. For example, suppose that you want to grant a number of permissions to a new...