OBIEE Security: Repositories and Three Layers of Security This is an off-site link.  Please review our Terms of Service for additional information.

(Michael Miller) This blog series reviewing OBIEE security has to this point identified how users are defined and authenticated within WebLogic, the major security concerns with WebLogic and how application roles are defined and mapped to LDAP groups within Enterprise Manager. We will now review OBIEE authorization, how OBIEE determines what data users can see after they login.

Read this article...

comments powered by Disqus