Documentos de Académico
Documentos de Profesional
Documentos de Cultura
It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracles products remains at the sole discretion of Oracle.
Oracle BI Applications Integration with Transactional Systems (Oracle EBS, PeopleSoft, Siebel CRM)
Agenda
Deployment Options EBS Flexfields Security Integration More Information
Deployment Options
Refer to: Oracle Business Intelligence Presentation Services Administration Guide Incorporating Oracle Business Intelligence Results into External Portals or Applications Using the Go URL
Profitability is calculated from Total Revenue and Costs (from Financial system) Cost To Serve is calculated from costs gathered from CTI systems, Service Systems, etc.
Action Links
Identify EBS table that supports the parameters needed from above
EBS table: OE_ORDER_HEADERS_ALL;
Create this physical table in the Oracle E-Business Suite OLTP schema as an opaque view
Map Action Link URL in the opaque view to the presentation layer and change property to hyperlink.
For Details Please Refer to Metalink3 Note: Enabling Action Links in Oracle Business Intelligence Applications for Oracle E-Business Suite (Doc ID 555254.1)
EBS Flexfields
Inventory
Finance
Accounting (GL#)
1 through 30
Position (POS)
Human Resources
Job (JOB)
3,6
Grade (GRD)
*These are the segments supported Out-of-box. The number of segments covered can be extended on-site. Procedure documented in OBIA Apps Install and Config Guide ** 20 segments are supported for item category sets (hierarchies)
Security Integration
Oracle BI Applications
Tightly integrated security model User Security Object Security Data Security
Oracle BI Foundation
Supports iPlanet, Novell, MSFT AD, Oracle Identity Directory (OID), and others Right content shown to the right user
User Security
How do I get in?
Oracle BI EE Security Based Authentication
Defines and stores user information in the RPD
User Security
LDAP Authentication
Stores information from the LDAP server in session variables
Database Authentication
Authenticates users through database logins
User Security
Oracle BI
user
User Security
Siebel CRM
4 drill back to Siebel CRM via Action Links
Oracle BI
user
1 log in once
User Security
Web Browser
Oracle EBS
6 drill back to Oracle EBS via Action Links
Oracle BI
user
1 log in once
Object Security
What parts of the application can you see? Business Logic Object Security
Presentation Layer Semantic Object Layer Physical Layer
Object Security
Query Blocking
Specified combinations of columns in queries can be blocked from running and the user is notified of the illegal query
Object Security
Dashboards:
Order Management Order Fulfillment
is assigned
is associated with
User:
OM Manager
Subject Areas:
Associated with Security Group:
Order Management Manager
Object Security
PeopleSoft
log in
Oracle BI
user
3
Data Security
Data Security
assigned to user
Responsibility
associated with
Inventory Organization
Data Security
log in
Oracle BI
user show data based on security group filters
3
Data Security
Data Security
Primary Position
Data Object:
Account Opportunity
Data Security
Siebel CRM
log in
Oracle BI
user show data based on security group filters
3
Data Security
A flattened hierarchy resulting in lesser number of table rows Stores more attributes at each level Populated through ETL to provide better query performance
Data Security
ROW_ WID
B8
West RM
C3 East RM
N-E DM
M17
West Rep1
D6
E9
East Rep1
N21
N-E Rep1
Q1/2006
Data Security
Data Security
SCD Type 2 for Position, Employee and Division Additional set of columns for As-Is / As-Was analysis
Data Security
Uses W_POSITION_DH and metadata elements in repository (session variable, security group, etc) to implement security Restricts data visibility to primary owner of a record in this case, a Position and those above the owner in the hierarchy (see figure) Leverages OBIEE 10g capabilities (IndexCol function) Advantages over 7.8.x security model:
POSITION_DH is a much smaller, flatter table than W_PARTY_LOGIN, thus queries run faster Richer functionality more attributes Current and historical hierarchies stores AS IS/AS WAS analysis possible Future 7.9.x release will implement team based security using same model upgrades easier
Further reference:
Oracle BI Apps 7.9.x Install & Config Guide http://download.oracle.com/docs/cd/E10783_01/doc/bi.79/e10742.pdf
Data Security
1. User logs in 2. User is authenticated based on log in credentials supplied 3. Session Variable called HIER_LEVEL is populated with the users hierarchy level obtained from W_POSITION_DH. Out of Box, HIER_LEVEL can be between 0 and 9 (10 levels). E.g., CEO has HIER_LEVEL = 9 (highest) 4. User is assigned to BI Apps security group that has same name as users Siebel OLTP responsibility 5. User also assigned to BI Apps specific security group called Primary Employee/Position Hierarchy-based Security that intelligently applies filters based on users hierarchy level (HIER_LEVEL) to queries on the logical tables to fetch data
Data Security
Uses W_POSITION_DH and metadata elements in repository (session variable, security group, etc) to implement security Restricts data visibility to primary owner of a record in this case, a Position and those above the owner in the hierarchy (see figure) Leverages OBIEE 10g capabilities (IndexCol function) Advantages over 7.8.x security model:
POSITION_DH is a much smaller, flatter table than W_PARTY_LOGIN, thus queries run faster Richer functionality more attributes Current and historical hierarchies stores AS IS/AS WAS analysis possible Future 7.9.x release will implement team based security using same model upgrades easier
Further reference:
Oracle BI Apps 7.9.x Install & Config Guide http://download.oracle.com/docs/cd/E10783_01/doc/bi.79/e10742.pdf
Data Security
is assigned
Login:
AFRANKS
User:
Data Object:
Service Request Response Activity
Data Security
Siebel CRM
log in
Oracle BI
user show data based on security group filters
3
Data Security
is assigned
Organization:
North America WEST
User:
Data Object:
Customer Opportunity Contact
Data Security
Siebel CRM
log in
Oracle BI
user show data based on security group filters
3
Data Security
Data Security
PeopleSoft
log in
Oracle BI
user show data based on security group filters
3
Data Security
PeopleSoft
log in
Oracle BI
user show data based on security group filters
3
Data Security
PeopleSoft
log in
Oracle BI
user show data based on security group filters
3
Data Security
PeopleSoft
log in
Oracle BI
user show data based on security group filters
3
Data Security
PeopleSoft
log in
Oracle BI
user show data based on security group filters
3
Data Security
Managed by
HR Organization
User:
HR Analyst
can view
Owned by
Data Object:
HR Data
Data Security
A regular employee can only see his data and his subordinates data
Data Security
Data Security
3
Data Security
More Information
More Information
Topic: Portal integration via JSR-168/WSRP Guide: Oracle Business Intelligence Enterprise Edition Online Documentation Library 10.1.3.3.3 (http://www.oracle.com/technology/documentation/bi_ee.html)
Presentation Services Administration Guide - Chapter 11: Integrating Oracle BI Presentation Services into Corporate Environments Using HTTP
More Information
Topics: Oracle BI EE Security Based Authentication, LDAP Authentication, External Table Authentication, Database Authentication Guide: Oracle Business Intelligence Enterprise Edition Online Documentation Library 10.1.3.3.3 (http://www.oracle.com/technology/documentation/bi_ee.html)
Deployment Guide, Chapter 7: Oracle Business Intelligence Authentication Mechanisms Server Administration Guide - Chapter 15: Security in Oracle BI
More Information
Topic: Single Sign-On (SSO) Guide: Oracle Business Intelligence Enterprise Edition Online Documentation Library 10.1.3.3.3 (http://www.oracle.com/technology/documentation/bi_ee.html)
Deployment Guide Chapter 8: Implementing Single Sign-On Products With Oracle Business Intelligence Chapter 10: Integrating Oracle Internet Directory With Oracle Business Intelligence Chapter 11: Enabling Oracle Single Sign-On for Oracle Business Intelligence
More Information
Topics: Business Logic Object Security, Web Object Security, Query Blocking Guide: Oracle Business Intelligence Enterprise Edition Online Documentation Library 10.1.3.3.3 (http://www.oracle.com/technology/documentation/bi_ee.html)
Server Administration Guide - Chapter 15: Security in Oracle BI Presentation Services Administration Guide - Chapter 3: Administering Oracle BI Answers - Blocking Requests in Answers
More Information
Topic: Flexfield Integration Guide: Oracle Business Intelligence Applications Online Documentation Library 7.9.5 (http://www.oracle.com/technology/documentation/bi_apps.html)
Installation and Configuration Guide Chapter 5: Customizing the Oracle Business Analytics Warehouse Chapter 7.1.1.6: Configuring General Ledger Account Hierarchies Using General Ledger Accounting Flexfield value sets definitions Chapter 11.2.2.19: About Configuring Key Flexfields
More Information
Topic: Value Set Hierarchy Integration Guide: Oracle Business Intelligence Applications Online Documentation Library 7.9.5 (http://www.oracle.com/technology/documentation/bi_apps.html)
Installation and Configuration Guide Chapter 9: Configuring Oracle Financial Analytics
More Information
Topic: Implementing Security for BI Apps Guide: Oracle Business Intelligence Applications Online Documentation Library 7.9.5 (http://www.oracle.com/technology/documentation/bi_apps.html)
Installation and Configuration Guide Chapter 6: Integrated Security for Oracle Business Intelligence Applications
More Information
Topic: Action Link Demo Enabling Action Links in Oracle Business Intelligence Applications for Oracle E-Business Suite (Doc ID 555254.1)
https://metalink3.oracle.com/od/faces/secure/km/DocumentDisplay.jspx?id=555254.1