tailieunhanh - Applied Oracle Security: Developing Secure Database and Middleware Environments- P57
Applied Oracle Security: Developing Secure Database and Middleware Environments- P57:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | This page intentionally left blank CHAPTER 14 Securing Oracle BI Content and Data 536 Part IV Applied Security for Oracle APEX and Oracle Business Intelligence n Chapter 13 we talked about securing access to the Oracle Business Intelligence BI server itself. Much of the discussion focused on authentication and authorization as these two topics represent the critical and important first steps of the security lifecycle. Now let s move into the realm of securing the actual data and content served up by Oracle BI. At this point Oracle BI knows who the end user is and knows the groups in which the user belongs. It will use this information to make sure that the end user sees only the content and data he or she is supposed to see. To run a report or dashboard successfully the user must have access both to the web content the dashboard or report definition and the data being served up by that report. The web catalog contains the definition of all of the dashboards and reports in the system. It does not contain any actual data. Securing web catalog content involves defining who can view or edit dashboard or report definitions and this is covered in the first part of this chapter. Next it focuses on securing the data presented through the web catalog content. Security must be applied to the data that is surfaced in the reports and dashboards defined in the web catalog. Fine-grained security for the data focuses on the security features that Oracle BI can add to the data and the features Oracle BI can leverage from the Oracle database. You ll learn about setting up Oracle BI to leverage Virtual Private Database VPD and fine-grained auditing FGA . Lastly a number of necessary and often desirable Oracle BI features give users additional privileges required for performing specific tasks. These features have obvious security implications and the chapter concludes by examining these features and identifying areas you may need to explore. Securing Web Catalog Content To run a .
đang nạp các trang xem trước