Oracle HFM Implementation Boot Camp

Slides:



Advertisements
Similar presentations
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Advertisements

Welcome to Middleware Joseph Amrithraj
95-843: Service Oriented Architecture Material taken from IBM CMU Ref. Architecture Document 1 Master of Information System Management Service Oriented.
FAST Radar System Engineering Overview. FAST Radar Overview –What’s Required? IIS 6.0  With Microsoft.NET Framework 1.1 and SMTP for MS SQL Server.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Understanding Active Directory
Building Enterprise Information Portal using Oracle Portal 3
Chapter 5 Database Application Security Models
Creating a SharePoint App with Microsoft Access Services
ORACLE APPLICATION SERVER BY PHANINDER SURAPANENI CIS 764.
Understanding Active Directory
Copyright 2005 © Persistent Systems ( 1 Overview of Persistent’s Custom Connector Offering.
Understanding and Managing WebSphere V5
Understanding Active Directory
Talend 5.4 Architecture Adam Pemble Talend Professional Services.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
“This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
Copyright 2007, Information Builders. Slide 1 WebFOCUS Authentication Mark Nesson, Vashti Ragoonath Information Builders Summit 2008 User Conference June.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
TechEd /22/2017 5:40 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
USM Regional PeopleSoft Conference
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Are you feeling secure ? Lee Donaldson Information Builders.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
Sanjay Soni BI Platforms Evangelist Microsoft Corporation Curtis Chernosky CBI Solution Manager Avanade Inc.
Nsure Idntity Manager & Oracle Internet Directory Michel Bluteau Field Corporate Strategist Nsure Identity Management Novell Québec.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Kyle Brokaw – LDS Church Russ Lowenthal – Oracle Corp. Session #102 Enterprise User Security – One Companies Experience.
Overview of the SAS® Management Console
Identity and Access Management Siddharth Karnik. Identity Management -> Oracle Identity Management is a product set that allows enterprises to manage.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Registries, ebXML and Web Services in short. Registry A mechanism for allowing users to announce, or discover, the availability and state of a resource:
Mirek Sztajno SQL Server Security PM
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Oracle HFM Implementation Boot Camp Presented by Saravanan Singaravadivelan Developed by Saravanan Singaravadivelan Senior Consultant Qubix International.
8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. BI Publisher Server: Administration and Security.
Oracle HFM Implementation Boot Camp
Oracle’s Hyperion Planning Architecture Browser/Office Client Windows* / UNIX / Linux Server Web Data EntryMS Office IntegrationReporting and Analysis.
Back to Basics A Tour of Microsoft SharePoint. Who am I? Kenny Duenke Lead Systems Analyst RGA
QlikView Integration Overview June Agenda Data Source Integration Web & Application Integration Security Integration Integration with 3rd party.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTERSTAGE BPM ARCHITECTURE BPMS.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Overview of the BI Tools – Enterprise CoE Scope of Services
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 Security Aspects of TPM 7.1.
SAP NetWeaver Business Intelligence SAP Netweaver Business Warehouse (SAP NetWeaver BW) the name of the Business Intelligence,
1 Case Study: Business Intelligence & Customer Data Customer Support Web-based Dashboard VP Marketing SQL XSLT XML Data Grid Customer Data Customer Order.
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
Oracle HFM Implementation Boot Camp Presented by Saravanan Singaravadivelan Developed by Saravanan Singaravadivelan Senior Consultant Qubix International.
1 Directory Services  What is a Directory Service?  Directory Services model  Directory Services naming model  X.500 and LDAP  Implementations of.
Alain Bethuyne Web Security Architect BNPParibas Fortis
Module 1: Introduction to Administering Accounts and Resources
MISSION POSSIBLE:  Migrating to Oracle’s Planning and Budgeting Cloud Service Bob Usset, EPM Manager © 2016 eCapital Advisors, LLC.
Power BI Security Best Practices
Oracle HFM Implementation Boot Camp
Oracle HFM Implementation Boot Camp
Oracle HFM Implementation Boot Camp
Oracle HFM Implementation Boot Camp
Oracle HFM Implementation Boot Camp
Oracle HFM Implementation Boot Camp
A Network Operating System Edited By Maysoon AlDuwais
Implementing a Distributed Enterprise Architecture to Deliver BI
Presentation transcript:

Oracle HFM 11.1.2.2 Implementation Boot Camp Presented by Saravanan Singaravadivelan Developed by Saravanan Singaravadivelan Senior Consultant Qubix International Ltd

V. Security

Shared Services Security Shared Services is a separate module that supports the Hyperion EPM suite. Provides user management, user provisioning, and external authentication definition. Provisioning refers to the process of assigning roles and access permissions to users for HFM applications. Products that implement Shared Services functionality require access to a Shared Services server running Shared Services client and server software, and to a database dedicated to Shared Services. Provides Lifecycle Management and Audit Reports

Areas of Security Users and Groups Roles Classes Can be created in the native Shared Services user directory Externally authenticated users are registered with Shared Services but are still stored in their original authentication directory. Roles When provisioning users, specific roles are granted by the administrator Users are typically divided into groups based upon the role that reflects both the product licensing and the controls/procedures that apply to the users Classes Assigned to metadata items and web components Users/Groups can be granted various access level to classes

Shared Services – User Provisioning Role based Centrally managed security Distributed security model Integrates with external systems When using Shared Service security, all provisioning is done through the Shared Services Management Console. Shared Services provides a centrally managed and distributed security model that will integrate with external authentication systems.

HFM Roles for Shared Services Administrator Roles Application Administrator Default Provisioning Manager User Roles Advanced User Consolidate Create Journals Data Form Write Back from Excel Enable write back in Web Grid Load Excel Data Manage Templates Read Journals Reviewer 1 Save System Report on Server

Access Rights for HFM Classes None No access – user does not see the item Metadata User sees the dimension member User cannot view/edit the data Promote User can see the data for the dimension member User can promote/reject in process control Read User cannot promote/reject in process control All User can modify the item and promote/reject the data These are the permission settings available in HFM starting with the most restrictive at the top (None) down to the Administrator level which allows unlimited access. Filter access can combine the roles between None and All allowing for much greater flexibility.

External Authentication To use external authentication, you must have an authentication directory containing corporate user information. The following types of authentication repositories are supported: Lightweight Directory Access Protocol (LDAP): IBM Tivoli Directory Server 6.1 Sun ONE 5.2 SP4 Novell eDirectory 8.8 OpenLDAP 2.3.37 Microsoft: Microsoft Active Directory 2000/2003 Microsoft NTLM The following is the list of authentication systems currently supported by Shared Services <read list>

External Authentication – cont’d SAP Directory: Enterprise Portal 6 SP16 or 7.0 Netweaver BI (SAP BW) 3.5 or 7.0 SAP R/3 Enterprise 5.0 Identity management systems: Oracle Internet Directory 10.1.4.3.0 and higher Oracle Virtual Directory 10.1.4.0.1 and higher Oracle Access Manager 10.1.4.0.1 and higher Oracle Application Server Single Sign-On Oracle Identity Manager 10.1.4.0.1 and higher Netegrity SiteMinder 6 The following is the list of authentication systems currently supported by Shared Services <read list>

Foundation Services Shared Services Technical Architecture Client Browser (JavaScript) Client (WebDav) Custom Application XML/HTTP WebDav Java/Web Server Struts Framework WebDav Servlet Security Abstraction Layer Metadata Abstraction Layer Security Client Content Management Service Shared Services has a 3 tier architecture, requiring a relational database repository and authentication system at the data level. If no external authentication system is available, Shared Services uses OpenLDAP for its authentication. The server has a number of low level services and sits within a Java application server. Tomcat ships with the installation. Client access is browser based to the Management Console. LDAP/WIN32 API JDBC Native External RDBMS OpenLDAP LDAP MSAD NTLM

Lifecycle Management Consistent, repeatable movement of apps, cubes, repositories or individual artifacts between development, test & production. User interface & command line capabilities. Auditing & application comparisons. dev test prod Supported through Shared Service Console 11 11

Exercise: Security

Main Steps: Lab 4 Create users/groups Provisioning users/groups Creating and assigning classes Extract and load security Migrate application using LCM