ODIExperts.com

The blog for Oracle Data Integrator ( ODI )

Security Module – Main concepts and use

Hi Friends,

We wrote this article to try to send some light on Security Module (10g for now) once several emails asked us for do it.

I hope that it can be useful!

The creation of users is relatively simple. Just open the Security module, go to the tab “Users” (Users) clicking the right mouse button and choose “Add User”

clip_image002

After opening the window only enough to fill the required information.

IMPORTANT: IF YOU CHECKED THE CHECK BOX OF “SUPERVISOR” CREATED YOU WILL HAVE NO RESTRICTION ON USE OF ENVIRONMENTAL ODI. This option enables the user CALLED “superuser”

At the end of user creation, you must add this to the desired profiles. I will use as an example, a developer can access any object in the repository development.

To do so, simply drag (drag and drop) the desired profiles to the newly created user:

clip_image004

IMPORTANT: THE PROFILE “CONNECT” IS MANDATORY FOR ALL USERS

Completed these steps the user is able to connect the repository with rights that were signed.

Granting privileges on projects and their components.

Granting privileges to a specific project can only be assigned to users have “Supervisor” and also with the profile of the “NG” (not generic).

In our example we will use a user named “Developer” which has only the profiles of “Connect” and “Designer NG

clip_image006

To determine if access should open side by side on screen, both modules, and Security Developer and then drag the desired design for the user who is entitled to access it as:

clip_image008

It will be shown a confirmation window

After confirming opens a window where rights of association have the following concepts:

a. The mark “Checked” means that the user can perform that action in any repository.

clip_image010

  1. The mark of “Denied” means that the user can not use that method:

clip_image012

  1. It is the mark of “Interrogation” means that the user can only use that method in the specified repository:

clip_image014
Established these conditions must then use them in the security window to set the user access to each object of that project:
clip_image016
Note that the methods “Edit Project” and “Duplicate Project” will only be available in the Repository “REPWORK.”
Only the method “Edit in new Window” will be allowed to all repositories
All other methods are denied (this is the default, should be configured as needed.)
We can see that after connecting the User “Developer” he has no rights other than those set:
clip_image018
It is interesting to inform you that the “rights” controlled by the security window can be understood as the options that appear when you right click on an object.
Other relevant information and that in this case example, there were signed on Direct Folders , Packages, Interfaces, etc.. And with that, the project does not bring any of your folders and if there is an attempt to create, an error such as:
clip_image020
The configuration of users without the standards should be made at the level of each method on that object.

These are the main tasks and concepts on Security Module.

Thanks for visit us!

2 Comments

Leave a Reply

Required fields are marked *.


This site uses Akismet to reduce spam. Learn how your comment data is processed.