Book Image

Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology

By : John Heaton
Book Image

Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology

By: John Heaton

Overview of this book

Oracle Database 11g is a comprehensive database platform for data warehousing and business intelligence that combines industry-leading scalability and performance, deeply-integrated analytics, and embedded integration and data-quality all in a single platform running on a reliable, low-cost grid infrastructure. This book steps through the lifecycle of building a data warehouse with key tips and techniques along the way. Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology outlines the key ways to effectively use Oracle technology to deliver your business intelligence solution. This is a practical guide starting with key recipes for project management then moving onto project delivery. Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology is a practical guide for performing key steps and functions on your project. This book starts with setting the foundation for a highly repeatable efficient project management approach by assessing your current methodology to see how suitable it is for a business intelligence program. We also learn to set up the project delivery phases to consistently estimate the effort for a project. Along the way we learn to create blueprints for the business intelligence solution that help to connect and map out the destination of the solution. We then move on to analyze requirements, sources, and data. Finally we learn to secure the data as it is an important asset within the organization and needs to be secured efficiently and effectively.
Table of Contents (21 chapters)
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology
Credits
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface

Chapter 14. Security

Security is a very broad and complex topic. Within a business intelligence and data warehousing project there are many facets to the topic. The recipes within this chapter will cover the following:

  • Creating an APEX custom authentication procedure

  • Creating a row-level Virtual Private Database (VPD)

  • Creating a column-level Virtual Private Database

  • Creating Virtual Private application context

  • Configuring OBIEE for multiple security providers

  • Integrating Microsoft Active Directory into OBIEE

  • Creating and configuring OBIEE roles

  • Configuring OBIEE privileges

  • Configuring OBIEE catalog security

  • Enabling Virtual Private Database in OBIEE

Introduction

Security is divided into three broad categories:

  • Authentication: Validates the identity of a person trying to access restricted resources (network, machines, applications, and others)

  • Authorization: Grants or denies access to specific content, for a given resource once an individual has been authenticated (roles, privileges, screens, tables...