OBIEE 11g, BI Apps EBS: What are default security variables and Init Block

Hi,
We are implementing BI Apps 7.9.6.3 [OBIEE 11.1.1.1.5 with EBS modules]. Out of the box RPD and mappings.
There are many VARIABLES and INIT BLOCKS in the RPD. Some of them are mainly for Siebel, Jd Edwards etc.
I need to know what are the default variables and Init Block configures in RPD. Also it will be highly appreciated if anyone can point out what segments we should configure if we need to implement security with simple database table authentication with SSO?
Thanks in advance.

You should review this doc for the options for EBS/OBIA security:
http://docs.oracle.com/cd/E20490_01/bia.7963/e19042.pdf
If helpful, pls mark as correct or helpful.

Similar Messages

  • "What are anonymous local variables."

    What are anonymous local variables and what are anonymous classes in java . If possible give one working example using anonymous classes and anonymous local variables .

    What are anonymous local variables and what areYou tell me. I never heard of such a thing.
    anonymous classes in java . If possible give oneClasses being declared without actually giving them a name. Sort of ugly.
    void myMethod() {
      ActionListener al = new ActionListener() { // Anonymous inner class
        public void ActionPerformed(ActionEvent e) {
          doMAgic();
      this.add(al);
    }

  • I have IPAD 1 and I would like to sharing the screen to monitor TV (video,photo,app). What are the options?

    I have IPAD 1 and I would like to sharing the screen to monitor TV (video,photo,app). What are the options?

    Unfortunately you do not have any options, the iPad one cannot be used for mirroring.

  • What are the available software and apps for ipod nano

    what are the available software and apps for ipod nano

    saif78 wrote:
    what are the available software and apps for ipod nano
    Sorry, but Apps are not compatible with the iPod and there is no additional software available for it.
    B-rock

  • What are the disc space and memory requirements for the apps?

    What are the disc-space and memory requirements to run the apps

    Hello John!
    thank you for the info. However, as I have only 1Gb memory and a 32Gb
    solid-state disc, I think that I will stay with Acrobate.com for a while
    longer.
    Regards
    Brianb

  • What are the logical structure and physical structure in oracle

    what are the logical structure and physical structure in oracle and how can allocate a DB block size as default size is 8192?

    From the Concepts Guide
    http://download-east.oracle.com/docs/cd/B19306_01/server.102/b14220/toc.htm
    The physical structures are:
    Datafiles
    Control Files
    Redo Log Files
    Archive Log Files
    Parameter Files
    Alert and Trace Log Files
    Backup Files
    The Logical Structures are:
    Tablespaces
    Oracle Data Blocks
    Extents
    Segments

  • What are the different tools and techniques available to track analytics in SharePoint online 2013?

    I want to know What are the different tools and techniques available to track analytics in SharePoint online 2013. Please provide your suggestions/ inputs. Thanks in advance.

    you can Use the Web Analytics Integration app  to
    connect your SharePoint Online public website to third-party web analytics services, such as Webtrends, Google Analytics, Adobe, and so on.
    Google Analytics
    Webtrends for SharePoint
    CARDIOLOG ANALYTICS
    Please remember to mark your question as answered &Vote helpful,if this solves/helps your problem. ****************************************************************************************** Thanks -WS MCITP(SharePoint 2010, 2013) Blog: http://wscheema.com/blog

  • What are the security risks for opening port 80 on workstations?

    Hello all,
    in our environment, there is an application which open port 80 on workstations when installed, but it is not allowed on preimeter FW
    could you please advise what are the security risks for leaving port 80 opened on the workstations? or it is considered secure unless it is not allowed on the preimeter FW?
    thanks alot & regards

    Hi R.Naguib.
    The 80 port is open by default through the firewall on Windows system, it is used by a http protocol by a browser.
    As for the network or hardware Firewall settings, I suggest to turn to the network administrator for details.
    Regards
    Wade Liu
    TechNet Community Support

  • Has anyone developed a site for podcast in Muse?  If so what are the pro's and con's vs. using Wordpress?

    have built a few sites in Muse and hope to host my podcast on a dedicated Muse created site.  I use BC for my sites.  Has anyone designed a podcast site in Muse and if so, what are the por's and con's opposed to just doing this with Wordpress and power press plugins?

    one-armed is the easiest to install - less disruptive as you can keep your current network unchanged.
    However, it requires special configuration to guarantee that the return traffic from the server goes back to the CSM.
    This is done by doing client nat which will prevent the servers to see the client ip address and therefore to create statistic based on client ip.
    There is a way to inser the client ip in the HTTP header, but it only works for HTTP.
    Router-mode is easier to understand and troubleshoot.
    The CSM is just like a router with vlans and routing between each of these.
    It requires a minimum of configuration.
    However, it is important to design correctly.
    For example I would recommend not to have client accessing the CSM directly.
    They should go through the MSFC first.
    Then I would recommend to have only 1 vlan between CSM and MSFC- this is because the CSM only uses 1 default gateway even if you can configure many.
    You never know which is active.
    The CSM also expect the traffic to come back on the vlan it went out. If you have multiple vlan it is difficult to control on which vlan the response will come back.
    Finally 'bridge mode' is good if you want to insert the CSM between the servers and their current default gateway without having to reconfigure the servers.
    This is a good solution.
    Disadvantage is that all traffic from servers will go through the CSM and it is more difficult to avoid in case you really need it.
    A little more complex to troubleshoot as well.
    Conclusion: bridge or routing mode is ok - avoid at all cost one-armed.
    Regards,
    Gilles

  • What are Task assignment adapter and Task Assignment Rule?

    What are Task assignment adapter and Task Assignment Rule?

    Task assignment adapter lets you return a value to the type and assignee values in the adapter. You can use these to dynamically assigned to users or groups.
    Task assignment rules let you specific the priority in which the assignment rules are done. If you go to any process task adapter and open it. Go to the assignemnt tab. Here is where you can specifiy your rules to create an order of determination. You can have multiple entries with rules determining organization and then have them assigned to appropriate groups in each assignemt rule entry. Or you can dynamically assign by using the default and a task assignment adapter to figure that out.
    -Kevin

  • My iSight is not working on my Macbook Pro. What are the possible problems and solutions?

    My iSight is not working on my Macbook Pro. What are the possible problems and solutions?

    Hello Douglas,
    Thank you for the details of the issue you are experiencing with the built-in iSight camera on your MacBook Pro.  I recommend the following steps for this issue:
    Important: Follow these instructions in order. Test the camera between steps to see if the issue is resolved.
    Built-in iSight cameras
    These steps are for iSight cameras that are built into a computer, such as the iMac G5 (iSight) or later, the MacBook, or MacBook Pro.
    See if the issue is application-specific.
    Try another application (iSight works with applications like iChat, PhotoBooth, and iMovie HD 6) to see if the iSight camera exhibits the same behavior in all applications. If it only happens in one application, try reinstalling that application.
    See if the issue is user-specific.
    Test your iSight camera in another user account. If the issue only occurs in one user, the issue would be isolated to user settings.
    Find out if the computer recognizes the iSight
    Check System Profiler (in the Utilities folder, inside the Applications folder). Under the USB header, check to see if the iSight camera is detected.
    Reset SMC or PMU
    Reset your computer's SMC or PMU, and then check System Profiler again. (SMC reset instructions for iMac G5 (iSight), Intel-based iMacs; PMU reset instructions for MacBook and MacBook Pro.)
    If your built-in iSight camera is still not behaving correctly after trying all these steps, you may need to contact Apple or an Apple-Authorized Service Provider for service.
    You can find the full article here:
    How to Troubleshoot iSight
    http://support.apple.com/kb/ht2090
    Thank you for using Apple Support Communities.
    Best,
    Sheila M.

  • What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    You want to allow someone to open your document and fill out the form (in the fields you have created), but not change or edit the form, right? Here's the answer - assuming you are using Acrobat Pro and someone will be opening the PDF using at least Acrobat Reader 9 and up:
    Tools > Protection > Encrypt < Encrypt with Password
    Answer YES to change the security.
    A new window opens:
         Do NOT select Document Open (or that will require a password to open the document.)
         Select: Permissions (Check the box next to "Restrict editing and printing of the document.")
         Change the following 2 settings from the drop-down box:
              Printing Allowed: Select High Resolution
              Changes Allowed: Select Commenting, filling in form fields, and signing signature fields
              Leave selected: "Enable text access for screen reader devices for the visually impaired"
              Change Permissions Password (insert a strong password)
              Leave all other settings alone in "Options"
              OK - OK
              Re-enter the Permissions Password (the one you entered above)
              OK - OK
              Save the PDF to apply the security [notice that (SECURED0 will appear after the document title]

  • What are the pro's and con's of the 4s?

    I am not yet an owner of the 4s iphone. So what are the pro's and con's of owning the white 32gb iphone 4s? I have had the white 32 gb iphone 3gs for two years and until I get a job I will not be buying the 4s I so need.

    Samplers do alot of things, what do you need a sampler for?
    Korgs remind me of alot of presets and alot of verb and chorus. I guess if you're posting here you already have EXS and want more sounds or more functionality and if the korg thing is true you lean more to sampling/synthesis than instrument recreation (as in you probably aren't going for VSL if the korg caught your ear). Independence looks really cool, it's quite new. Kontakt is demanding and very flexible, both include huge libraries and I know kontakt has tons of great filters, FX, modulation. It also needs a pretty strong update-which is being dealt with after a year or so.

  • What are the systems variables in oracle

    Hai All
    In oracle what is called system variable and types of system variables
    Good answer hepls me
    Thanks & Regards
    Srikkanth.M

    SET System Variable Summary
    Source:http://download.oracle.com/docs/cd/B19306_01/server.102/b14357/ch12040.htm
    Oracle environment variables
    The following environment variables are valid for Oracle::
    ORACLE_HOME
    ORACLE_BASE (optional)
    ORA_NLS (optional)
    NLS_LANG (optional)
    TNS_ADMIN (optional)
    Source:http://publib.boulder.ibm.com/infocenter/db2luw/v9/index.jsp?topic=/com.ibm.websphere.ii.foundation.conn.fw.orc.doc/configuring/iiylsorcenvvars.html
    ORACLE_SID is the name of the database instance that you are using.
    T2KDEV is set to the type of terminal you are using; sun if you are using openwindows; xsun if you are using X windows.
    TERM is set to the type of terminal you are using. Note: If you are using openwindows, you may have to redefine the variable TERM to sun (instead of cmd-sun) and you should execute ORACLE from a shelltool.
    TWO_TASK is set to the location where ORACLE server can be found and will normally be the name of the database instance. This variable helps simplify the command line for starting ORACLE tools.
    Source:http://ugweb.cs.ualberta.ca/~c391/manual/chapt3.html
    HTH
    Girish Sharma
    Edited by: Girish Sharma on Mar 3, 2010 9:16 AM
    Link and Text added.

  • What are the physical topology and logical topology in sharepoint

    Hi
    what are the physical topology  and logical topology in sharepoint
    how to define  the physical topology  and logical topology in
    sharepoint
    adil

    Here are the example topologies for SharePoint:
    Traditional - 
    http://www.microsoft.com/en-us/download/details.aspx?id=30377
    Streamlined - 
    http://www.microsoft.com/en-us/download/details.aspx?id=37000
    Trevor Seward
    Follow or contact me at...
    &nbsp&nbsp
    This post is my own opinion and does not necessarily reflect the opinion or view of Microsoft, its employees, or other MVPs.

Maybe you are looking for

  • Error while create user in LDAP - LDAP: error code 1

    Hi Guy's, I am getting below error while creating user in LDAP MS AD. cn=3001,ou=sAP_IDM,dc=springswf,dc=comcn<mx:TEXT>putNextEntry failed storingOU=SAP_IDM,DC=springswf,DC=com</mx:TEXT> <mx:LTEXT>Exception from Add operation:javaxnaming.NamingExcept

  • How to map the following pricing procedure in SAP

    hello all guru of SAP, here is the pricing which is used in our company so i want to map it in SAP so how to do this just bellow is the example spoiler maruti zen vxi material name    779SMZV is the material number basic price @36.11 for 300unit is  

  • Possible bug in Polymorphi​c AI Single Scan?

    I'm trying to use the AI Single Scan VI to read a set of 3 analog input channels (2 differential, 1 rse) under LabView 6i, but I'm having some strange problems. The output is polymorphic, so I select the output type I want by popping up and going to

  • Trouble starting Apache after 1022 install

    I can not start Oracle HTTP server after a new install of iAS 1.0.2.2 on NT. I get following error when I try to start: Syntax error on line 298 of d:/oracle/isuites/apache/apache/conf/httpd.conf: Port must be numeric Note the errors or messages abov

  • Can Order By Clause be used on a Text Column to Sort the Data????

    Hello There, I am trying to sort the code generated by the PL/SQL Package..I mean the procedures inside the package should be ordered in a ascii collating sequence..(A to Z).. Could I get a help to perform this.......