OBIEE - Authentication (ATN)

Obi Edition

About

Authentication in an OBIEE context.

A user is authenticated if the USER system variable is set. Then an init block can authenticate a user.

The goal of the authentication configuration is to get a confirmation of the identity of a user based on the credentials provided.

In OBIEE, the credentials provided are hold in this two variables:

OBIEE Version

In 10g, the authentication process is managed by the BI Server, 11g, the authentication process is managed by the weblogic server.

11G

10g

OBIEE 10G - Authentication

Login/Authentication Process between Oracle BI Server and Oracle BI Presentation Services

The Oracle BI Server and Oracle BI Presentation Services client support industry-standard security for login and password encryption.

When an end user enters a login and password in the Web browser, the Oracle BI Server uses the Hyper Text Transport Protocol Secure (HTTPS) standard to send the information to a secure port on the Oracle BI Presentation Services.

From the Oracle BI Presentation Services, the information is passed through ODBC to the Oracle BI Server, using Triple DES (Data Encryption Standard). This provides a high level of security (168 bit), preventing unauthorized users from accessing data or Oracle BI metadata.

Support

Unable to Sign In

Unable to Sign In An invalid User Name or Password was entered
Unable To Sign In. An Error Occurred During Authentication

See: OBIEE 11g: Error: “Unable to Sign In” when Authentication Fails

Authentication Method Certification

See: System Requirements and Supported Platforms for Oracle Business Intelligence Suite Enterprise Edition 11gR1 > tab: Supported Security Interop

Documentation / Reference





Discover More
Bi Server Architecture With Client
OBI Server - User

User is a system session variable that: represent an account holds the value the user enters as his or her logon name. It is involved: in the authentication security process to set it up and...
Saw Object
OBIEE - Authentication Web Service with SAWSessionService (nQSessionService)

The OBIEE Web Service SAWSessionService (nQSessionService) provide authentication methods such as logon and logoff.
Obiee 11g Connection Pool Query Only Selectable
OBIEE - Initialization Block

This option will show you all connection pool that are not the first one. This option is designed to check the Initialization block who hold security/important variables. In other word, if the...
Obi Edition
OBIEE - Password

The password is a system session variable that: is involved in the authentication security process holds the password the user enters during the login process. The Password variable is populated...
Obi Edition
OBIEE - Saw Url - Symbolic URL Parameters Applet

The saw url (Siebel Analytics Web) is the base url that command BI Presentation Service and call different (modules|applications|command) Where Cmd can be: go to navigate to a report and/or filter...
Obi Edition
OBIEE - Security

To determines who has the ability to view data and objects, you can combine several parameters configuration on different security levels: Object Security: business logic security (repository) and catalog...
Obi Edition
OBIEE - Security (Level|Type)

security in Oracle BI can be classified broadly into the following three types. Data-level security Object-level security User-level security see Object-level security controls the visibility...
Obiee11g System Session Variable
OBIEE - System session variables (reserved variables)

System session variables are session variables that the Oracle BI Server and Oracle BI Presentation Services use for specific purposes. System session variables have reserved names, that cannot be used...
Obi Edition
OBIEE 10G - Authentication

The legacy authentication methods supported by BI Server are: External LDAP-based directory server External initialization block authentication Table-based A user can be defined: in the repository...
Obiee 11g Bisqlprovider Schema
OBIEE 11G - BISQLProvider

A authentication provider called BISQLGroupProvider that provide the groups through database look-up. This group can then be linked to application role. The database just stores the groups to be associated...



Share this page:
Follow us:
Task Runner