01.02.2013 Views

Publishing Reports to the Web - Downloads - Oracle

Publishing Reports to the Web - Downloads - Oracle

Publishing Reports to the Web - Downloads - Oracle

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9<br />

Securing <strong>Oracle</strong>AS <strong>Reports</strong> Services<br />

The celebrated openness of <strong>the</strong> Internet brings with it concerns about controlling who<br />

has access <strong>to</strong> what confidential company information. <strong>Oracle</strong>AS <strong>Reports</strong> Services<br />

provides a number of security options that enable you <strong>to</strong> ensure that <strong>the</strong> appropriate<br />

users are getting important data in a secure fashion. This chapter provides an<br />

overview of <strong>the</strong> available security options.<br />

■ About <strong>Oracle</strong>AS <strong>Reports</strong> Services Security<br />

■ Configuring <strong>Oracle</strong>AS <strong>Reports</strong> Services Security<br />

9.1 About <strong>Oracle</strong>AS <strong>Reports</strong> Services Security<br />

This section describes how <strong>Oracle</strong>AS <strong>Reports</strong> Services security operates <strong>to</strong> secure<br />

access <strong>to</strong> your reports and <strong>the</strong> data <strong>the</strong>y include.<br />

■ Resources Protected<br />

9.1.1 Resources Protected<br />

■ Authorization and Access Enforcement<br />

■ Leveraging <strong>Oracle</strong> Identity Management Infrastructure<br />

<strong>Oracle</strong>AS <strong>Reports</strong> Services encompasses functionality for three main areas of security:<br />

■ Application security (i.e., controlling access <strong>to</strong> <strong>the</strong> report application, where users<br />

launch report requests)<br />

■ Resource security (i.e., controlling access <strong>to</strong> reports, printers, calendars, and<br />

<strong>Reports</strong> Servers)<br />

■ Data source security (i.e., for controlling access <strong>to</strong> a particular database)<br />

9.1.1.1 Application Security<br />

Typically, users must log on <strong>to</strong> an application or site from which <strong>the</strong>y can access and<br />

run <strong>the</strong>ir reports. This launcher application is typically protected by some sort of login<br />

facility, such as <strong>Oracle</strong>AS Single Sign-On. Once <strong>the</strong>y successfully gain entry in<strong>to</strong> <strong>the</strong><br />

launcher application, resource security takes over and determines which reports and<br />

destinations a given user or group may request.<br />

For application security, <strong>Oracle</strong>AS Single Sign-On provides a single point of user login<br />

and, optionally, data source security. In a typical configuration, <strong>the</strong> user would log on<br />

through <strong>Oracle</strong>AS Single Sign-On <strong>to</strong> gain access <strong>to</strong> a report application, where <strong>the</strong>y<br />

would access and run <strong>the</strong>ir reports.<br />

Securing <strong>Oracle</strong>AS <strong>Reports</strong> Services 9-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!