Book Image

Oracle Business Intelligence Enterprise Edition 12c - Second Edition

By : Adrian Ward, Christian Screen, Haroun Khan
Book Image

Oracle Business Intelligence Enterprise Edition 12c - Second Edition

By: Adrian Ward, Christian Screen, Haroun Khan

Overview of this book

Oracle Business Intelligence Enterprise Edition (OBIEE) 12c is packed full of features and has a fresh approach to information presentation, system management, and security. OBIEE can help any organization to understand its data, to make useful information from data, and to ensure decision-making is supported by facts. OBIEE can focus on information that needs action, alerting users when conditions are met. OBIEE can be used for data analysis, form production, dashoarding, and workflow processes. We will introduce you to OBIEE features and provide a step-by-step guide to build a complete system from scratch. With this guide, you will be equipped with a good basic understanding of what the product contains, how to install and configure it, and how to create effective Business Intelligence. This book contains the necessary information for a beginner to create a high-performance OBIEE 12c system. This book is also a guide that explains how to use an existing OBIEE 12c system, and shows end users how to create.
Table of Contents (24 chapters)
Oracle Business Intelligence Enterprise Edition 12c - second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Administration


To the left of the Help link is the link to the Administration screen. You can also save a link to the address http://[server]:<port>/analytics/saw.dll?Admin:

The content on the Administration screen is controlled and therefore, you will only see what the system administrator has privileged for you. A full-access user will see eight sections on the Administration screen.

The Security section provides links to the administration of catalog groups and system privileges.

Use the Session Management link to view currently logged in users and see what they are running. An active request could be canceled if they are taking too much time.

In Chapter 6 , Understanding the Systems Management Tools, we will see that we can create Users and Groups in our security store (LDAP). The Presentation Catalog uses those groups and users that have been previously set up, but it also has the facility to create its own groups. This may be useful for certain types of special access that you...