Discoverer security limitations

Hi all,
Does Discoverer allow security to be implemented down to specific items? If I had a workbook and several users had access to it, would there be a way for me to define which user could drill down into which item? Also, if I had a report for sales figure per region, could I implement security so that one could only
see the details for one's region?
Any help in this regard would be appreciated.
Thanks,
Gillian

Gillian,
For such security requirements, you might want to define different custom folders on top of the exiting and apply security settings to them. e.g create a custom folder which contains all items required for the sales report, but put a mandatory condition of region=<one particular region> on that folder and give access to users for that region...
Cheers
Deepak
Hi all,
Does Discoverer allow security to be implemented down to specific items? If I had a workbook and several users had access to it, would there be a way for me to define which user could drill down into which item? Also, if I had a report for sales figure per region, could I implement security so that one could only
see the details for one's region?
Any help in this regard would be appreciated.
Thanks,
Gillian

Similar Messages

  • Discoverer Security with eBusiness Suite

    Is there any document that explains how discoverer security is integrated with Oracle APPS 11i or 12i security.

    Hi,
    I am not aware of any complete document covering eBS security. You can look at John Abel's book Oracle E-Busines Suite Security which covers many aspects including some on Discoverer.
    Discoverer integration with eBS menus is covered in the Metalink notes 471303.1 and 278095.1. Connection security is covered in the Discoverer documentation (http://download.oracle.com/docs/html/B13918_03/apps.htm#i1006413).
    Different apps modules use different mechanism for data security. These are covered in various metalink notes, for example note 290291.1 covers GL security.
    Rod West

  • Discoverer 10g Limitations....

    Hi,
    Is there any document or can you give me some info about Discoverer 10g limitations.... such as the maximum folders per business areas , hierarchies.... e.t.c.
    Regards,
    Simon

    Hi
    I don't believe there are any physical limits to things such as folders, items, hierarchies and so on. The only limits you have is memory, CPU capacity, network bandwidth, hard disk storage and the database limits.
    Of course, memory is the one you are most likely to run into trouble with so the more memory you have the better Discoverer Plus will be.
    Best wishes
    Michael

  • /etc/security/limits.conf

    Hello
    OS : Redhat enterprise Linux Ver 5
    When installed as per install guide, I see that /etc/security/limits.conf updated with entry as :
    oracle hard nofile 65536
    1) Why is the default limit of 1024 not sufficient ?
    2) Does oracle opens more than 1024 files at a time ?
    3) How to find the exact list of files open by the oracle user at any given point in time ?
    Thanks in advance for your help.

    Hi,
    that's a good question. I don't neither have an answer but I assume that especially in the past (8i) when datafile size was limited that it was causing problems on huge databases. Making it enough high could also reduce their support effort. This is just may stomach feeling which I am telling you but the truth will tell you someone else. Maybe someone else here in the forum knows more than me.
    I am not 100% sure but:
    $ lsof|grep oracle|wc -l
    1762 shows me over 1024 open files. This with a running ASM instance, a DB and a listener.
    Cheers,
    David
    OCP 9i
    http://www.oratoolkit.ch/otn.php

  • BOE XI 3.1 Security Limitations and Assumptions

    Hi,
    Can any one please let me know the BOE XI 3.1 Security setup Limitations, Assumptions and Risks in Windows environment(Windows 2008 server)
    Also please share the mitigation and solutions of these risks.
    Regards,
    Jai

    Hi all,
    Please check out the "Windows pattern security" section and security related sections of the windows pattern book below -
    https://websmp201.sap-ag.de/~sapidb/011000358700000532872009E/xi31_bip_pattern_win_en.pdf
    The pattern book should address most of the XI3.1 implementation related questions.
    Below planning guide also provides good insight for planning your deployment
    https://websmp105.sap-ag.de/~sapidb/011000358700001647142008E/xi3-1_bip_deploy_plan_en.pdf
    regards,
    Shiva

  • Customozing Oracle Discoverer Security

    Hi,
    Please help me in following scenario. I am having security service as web service which maintain all tokens about users. When any user from a system try to connect to disoverer it should use this token id and send to discoverer. And the Discoverer should talk to this security service using this token id. After authenticating with security service it should allow that user to view reports.
    Could you please let me know how this is possible? Can I make some customization in Discoverer so that it should talk to security web service?

    Hi,
    I am not aware of any complete document covering eBS security. You can look at John Abel's book Oracle E-Busines Suite Security which covers many aspects including some on Discoverer.
    Discoverer integration with eBS menus is covered in the Metalink notes 471303.1 and 278095.1. Connection security is covered in the Discoverer documentation (http://download.oracle.com/docs/html/B13918_03/apps.htm#i1006413).
    Different apps modules use different mechanism for data security. These are covered in various metalink notes, for example note 290291.1 covers GL security.
    Rod West

  • Label Security Limitations

    [10.2.2]
    I've inherited a database that has about 500 groups within one policy. I'm told there is a potential for it to continue to grow at a rate of maybe 10 per year.
    Are there any limitations on the maximum number of groups, categories, etc for label security?

    In
    http://download.oracle.com/docs/cd/B19306_01/network.102/b14267/labels.htm#i1006370
    on 2.2.4 Groups session, we find:
    Groups are optional; a label can contain zero or more groups. Oracle Label Security permits defining up to 10,000 groups.

  • Discoverer Security

    Hi! We are in the process of installing an Oracle-based application. We have tightly controlled access to the database by using the Application's security which is tied to Oracle's. When we use Discoverer Plus, we are dumbfounded to find that the database restrictions do not seem to apply. Are we missing something here??
    Help, please.

    Marcus,
    I'm curious about what you've written - 'they can see the folders even though they don't have access to tables at DB level'. How would something like this be solved, or even checked?
    I think I'm having a similar issue. Under the 'Accounts Payable' Business Area (resp - Payables Manager), there are some GL folders (i.e. 'GL Accounts' for one). As soon as I try to view anything from this folder, no data is returned.
    However, if I go under the 'General Ledger' Business Area, (different resp - General Ledger Controller) I can then see the data.
    Is there a security setting somewhere for the AP area that needs to be set so I can see data from the GL folders?
    Thanks,
    Janel

  • Security Profile with Assignment-level Security limitations

    Hi, We are on an R12 installation, and have a security profile based on Organization Hierarchy (With Assignment-Level Security - i.e. 'Restrict on Individual Assignments' checkbox is ticked); this is based on a specific organisation as the 'Top Org' rather than the User's own Assignment.
    The profile option "HR: Access Non-Current Employee Data" is set to 'Yes', but the security profile still restricts access to Future-Dated Assignments and Ended Assignments. Is this expected behaviour, and is the only solution to develop a Custom security profile, and is this even feasible (to replicate organisation hierarchy security using SQL in the custom security tab), or would we have to use a different criteria, such as Payroll?
    Regards, Chris

    Further investigation reveals this is a limitation of the product - within security, the selection criteria which determines which individuals (or assignments) is handled seperately to Assignment-level security (i.e. whether individual assignments are restricted), it is not possible to get around this issue even using custom security, as that does not give one the power to determine how individual assignments are handled. Thus if assignment-level security is implemented, the user cannot see Ended or Future-Dated assignments, even if the profile option "HR: Access Non-Current Employee Data" is set to 'Yes'.
    The only workaround we have found for this is to:
    a) remove assignment-level security, and
    b) ensure that where an employee has multiple assignments that cross security groups, this individual is set up twice, as two separate employees.

  • Security limitation of Bex reporting

    Hi Gurus,
    Is there a limitation as to what can be secured in BEx reporting in terms of securing data by individual infoobject eg. selective master data value level? Eg. I want to restrict this user to view the corresponding keyfigure values for all characteristic values except for those he is entitled to view?
    Regards
    Alfonso S.

    Hi Mikko,
    My requirement was to limit the Leaf node, not the subnode.
    My subnode is branch of a few leaf nodes.
    I want to limit visibility of these leaf nodes to only a subset of the available leaf nodes.
    A leaf node here is a characteristic value (lowest level). The subnode is just a text node.
    I have no problem restricting by subnodes which are not leaf nodes.
    Can a guru confirm if BW can meet this requirement.
    That means to say, is there a limitation on the part of BW to restrict a hierarchy at the leaf node level? I have no issue with restricting by subnodes.
    Regards
    alfonso s.

  • PDF prints from Acrobat 9 formatting off and security limitation after mac 10.9.2 OS security update

    When I print to Acrobat from Word, the output formatting gets messed up (single lines turn to doubles, column to right shifts to the left) ; I can't combine two documents; AND I get a security erro message when I try to reduce file size.

    This type of problem is best solved by submitting a formal support case with our developer support staff...

  • Discoverer Security Certificate not Recognized on MS IE

    On some PCs, when entering the Discoverer web site using microsoft explorer, the first certificate window appears, but the certificate is not recognized.
    What could be the cause ?

    The exact error message is:
    An error occurred while accessing online revocation server

  • Discoverer Security through Portal

    We use Portal for displaying discoverer worksheets. In portal we select the "display to user using Publishers connection". However, when users click analyze on the report it prompts them for a password. Is there any way around this. We don't want users to have there own discoverer logins. We just want them to analyze the reports we setup in portal for them to view.
    Thanks in advance on any help with this issue.

    Take a look at the steps to integrate discoverer with single sign on (SSO). Then once a user has authenticated in Portal, they will be authenticated in Discoverer too.

  • Airport Express Security - Limiting Access for Kids

    I have an Airport Extreme network. Would like to let my kids use a laptop for homework, but don't want them to be able to access internet without asking first. Is there a way to set up security so that laptop cannot access wireless network unless password is entered EACH time? THX

    James, Welcome to the discussion area!
    On your Mac, configure the OS X Network preferences so that AirPort is disabled.
    Give your kids a non-admin OS X user account.
    If they need to access the Internet, they will need to find you so that you can modify the Network preference pane to enable AirPort. After they are done, you will need to disable AirPort before their next use.

  • Security - Limiting users to use certain contexts

    Hi
    I want to set up some users that have design and execution capabilities, but I want to limit them to be able to execute in one context only (i.e. development).
    I have a production context and I do not want developers having access to execute scenarios in this context.
    Any ideas how to achieve this?
    Thanks in advance.

    Hi,
    How about setting password for PROD context?
    http://img89.imageshack.us/img89/2586/screenshot016w.jpg
    http://img248.imageshack.us/img248/5725/screenshot017y.jpg
    Thanks,
    G

Maybe you are looking for

  • Using bind variables (in & out) with dynamic sql

    I got a table that holds pl/sql code snippets to do validations on a set of data. what the code basically does is receiving a ID and returning a number of errors found. To execute the code I use dynamic sql with two bind variables. When the codes con

  • Pages crashes upon export of PDF every time

    I am attempting to export a document with endnotes as a PDF, and Pages crashes, without fail, every time. Any ideas?

  • G/l in invoice

    Hi I am  configuring pricing proceure the  requierment is vat add to separe g/l account  in migo and while same add in material cost during invoice I am geeting in migo g/l account with value ,but not coming in invoice what should to do get correct v

  • RE: (forte-users) Check this ( -----THIS MESSAGE WASA VIRUS!!!!!)

    The previous message (Check this) is a known virus. (Either that or the sender is emulating it. Either way, do not open the attachment as you will not have "fun" at all. Delete the message immediately. Of course, if I am wrong then I am an idiot! Don

  • Basestation driver for OS 10.5?

    I just bought an Airport base station (the white one that looks like a Hersey's kiss). When I try to install from the CD, the message comes up: "Installer Update is required for this update." I have no idea what that means. I keep my laptop updated.