Oracle Business Intelligence (BI) is designed to provide open, complete and integrated solution including dashboards, ad hoc query and analysis, score cards and enterprises.
Some of the aspects offered include an expansive spectrum of embedded search, visualization options, mobile access and collaborative applications along with Microsoft Office integration. Users are afforded the ability to initiate most of these actions from a dashboard environment.
Oracle Business Intelligence Foundation Suite
The Oracle BI Foundation Suite is designed to be a common enterprise information model which enables users to ensure accurate and consistent information on a continual basis at any location. In particular, Oracle Business Intelligence technology tools include:
The OLAP server is designed to enable rapid modeling of security solutions which streamline forecasting, management reporting and variance analysis processing. Real-time decision solutions were developed to optimize:
1. Defined repository security. Oracle Business Intelligence provides an administration tool that may be used to create groups and users with particular and specified permissions that are defined through certain types of authentication. Once the permissions are assigned, permissions are granted to specific groups and users.
Privileges granted with exclusivity most often have precedence over group privileges. When conflict exits, privileges with least restrictions will apply.
2. Database authentication. Below is the process used for authenticating the database:
Upon connection, authentication has been effected successfully.
3. Lightweight Directory Access Protocol (LDAP) authentication. Many businesses, companies and enterprises have implemented LDAP server authentication as part of their Oracle Business Intelligence solution. One popular aspect of this is the Active Directory Service Interface (ADSI) for client projects.
The LDAP server is created in the security manager. Below is the process:
4. External table authentication. The External Table Authentication is implemented by establishing a table within the database that includes columns defining aspects such as passwords, users, groups, display name, the log level, display name and security level and privileges. The table for authentication is created as follows:
The above describes some of the processes by which the extensive Oracle Business Intelligence solutions may be utilized for an effective security strategy.