Integration between EBS 12.1.3 and OLIVIER 7.9.6.4

Hi all

We are implementing EBS 12.1.3 and OLIVIER 7.9.6.4 (on obiee 11.1.1.7.0) and I'm trying to understand a concept based on the integration of SSO between EBS & OLIVIER:

-For the integration of SSO between EBS & OBIEE to work, I must explicitly create any user to OBIEE, and then map it to a particular user to EBS? Or is there no need to create any explicit user in OBIEE?

(I couldn't find it mentioned in the documents of EBS & OLIVIER/OBIEE integration that I talked yet)

Kind regards

Sandeep

What you say is correct. Add to your points

the user does not need to be already exist in OBIEE, but you create application roles in similar EM for the responsibilities that you have created in EBS. Now, you would be assign responsibilities to users in EBS for example: financial OBIEE will have users ABC, XYZ, so when you create the same Application roles in the EM as EBS you would be assign these roles to application to SA different regarding the names of responsibility EBS eg: financial OBIEE application roles would be related to SA Financials so when the user clicks on that responsibility in EBS to navigate to OBIEE would use the application role in EM and give the user access to finance SA to form analysis. Similarly, you would be assign created in EM to the catalog application roles to access respective dashboards

It may be useful

Tags: Business Intelligence

Similar Questions

  • A few questions about integration between POET and EBS

    Hi you
    I am a new bie BIEE. In those days, have a look at the POET architecture and BIEE components. In the next project, there is some work on the development of POET based on request of the EBS. I have a few questions about integration:

    (1) generally, the POET application and database server is decentralized with application and database EBS? Both BIEE 10g and 11g version can be integrated with EBS R12?

    (2) in the POET administration tool, the first step is to create arrays of physics. If the source application is EBS, is it still necessary to create the physical tables?

    (3) if the physical creation of tables is needed, how to transfer data from the source of BSE BIEE physical tables tables? What ETL tool is preferred for most of developers? generator for warehouse or Oracle data integration?

    (4) during the data transfer phase, there are many many large data to transfer, how to keep the entire? for example, it must transfer 1 million lines of source to physical tables BIEE database, when 50% is completed, users try to open the POET report, they can see the new data of 50% on the reports? is there some transaction in phase control ETL?

    could someone give some pointers for me? I am very appreciated if you can also provide any other information.

    Thanks in advance.

    (1) generally, the POET application and database server is decentralized with application and database EBS? Both BIEE 10g and 11g version can be integrated with EBS R12?

    You shud look at OBI request here that uses OBIEE as a tool for reporting with pre-built modules. 10g & 11g comes with different versions of the applications of BI that supports sources such as Siebel CRM, EBS, Peoplesoft, JD Edwards, etc...

    (2) in the POET administration tool, the first step is to create arrays of physics. If the source application is EBS, is it still necessary to create the physical tables?

    His independent of any source. It comes to OBIEE modeling to create the RPD with all the layers. If you build from scratch, then you will need to create all layers else if BI Apps is used so you can get pre-built RPD and other pre-designed components.

    (3) if the physical creation of tables is needed, how to transfer data from the source of BSE BIEE physical tables tables? What ETL tool is preferred for most of developers? generator for warehouse or Oracle data integration?

    BI apps comes with ETL pre-built mapping to use with the tools majorly with Informatica. Only applications BI 7.9.5.2 comes with ODI, but oracle has the intention of having only ODI for any other versions.

    (4) during the data transfer phase, there are many many large data to transfer, how to keep the entire? for example, it must transfer 1 million lines of source to physical tables BIEE database, when 50% is completed, users try to open the POET report, they can see the new data of 50% on the reports? is there some transaction in phase control ETL?

    User will see still old data because its good enable Cache and serving it after each load.

    See http://www.oracle.com/us/solutions/ent-performance-bi/bi-applications-066544.html...
    and a lot more docs on google

    Hope this helps

  • Find the area between the axe of waveform and time

    Hello.

    I have acquired a signal to 1ms rate. I recorded in a .lvm file, and now I want to calculate the area between the axe of waveform and time. So, it's a classic integral.

    So, I create a .vi separated with a module for reading measurement, but I don't know which is the right module of integration, in this case. I tried all the modules to integrate to find the area, but no good result.

    PS: I also want to display this area, hasurate, somehow, but it's secondary.

    Any idea?

    For the first part, we should look at your code and data.

    The second use the "Fill" option available for the plot which will fill in the specify box.

    Ben

  • the differences between Oracle Discoverer 10 g and 11g.

    We would like to know if there are differences between Oracle Discoverer 10 g and 11g and problems with 10 g that are overcome in 11 g.


    Please make us aware of any background to 11g over 10g.


    apps version 11.5.10.2

    Concerning

    Please visit these links for the list of new features, bug fixes, certification and installation of discoverer 11g on 11i instance.

    Discoverer 11.1.1.4 certified with E - Business Suite
    http://blogs.Oracle.com/stevenChan/2011/02/discoverer_11114_ebs.html

    EBS Sysadmin Primer: Oracle BI discoverer 11 GR 1 material
    http://blogs.Oracle.com/stevenChan/2010/08/discoverer_11gr1_primer.html

    Discoverer of Oracle Business Intelligence 11g
    http://www.Oracle.com/technetwork/developer-tools/discoverer/Overview/index.html

    Oracle Business Intelligence 11g Discoverer documentation
    http://www.Oracle.com/technetwork/developer-tools/discoverer/documentation/index.html

    Thank you
    Hussein

  • Not able to apply the filter on certain groups of OBIEE integrated with EBS

    Hello

    We have integrated with EBS OBIEE. There are some pre configured in OBIEE RPD groups. These groups are all members of the Group GL safety rules. I applied the filter of some safety GL group business model... But are not filtering data for certain groups. For the rest of the groups it works fine.

    I applied after filter on table GL Business logical area. (VALUEOF (NQ_SESSION. ("" EBS_BUSINESS_AREA_FULL ") = 'X' OR Core. "Dim - GL business district '." "' Level 20 business code" = VALUEOF (NQ_SESSION. (("" EBS_BUSINESS_AREA "))

    But this filter does not work for the following groups
    (1) OBI Budget content Global Support
    OBI 2 overall content power user)

    While it works very well for the following groups
    (1) OBI UK broadcast finance.
    Director of finance 2) OBI UK broadcast.

    I'm new to EBS. If someone can explain how the EBS group are mapped with RPD OBIEE groups and how the security is implemneted then it will be a great help.


    Thank you
    Sandeep

    Hi Sandeep,

    You mean in Oracle eBS? That it would be something like this;

    Select user_id fur.user_name
    user_name fur.description
    rsp.responsibility_name
    rsp.description responsibility_description
    of apps.fnd_responsibility_vl RER
    apps.fnd_user_resp_groups furg
    applsys.fnd_user fur
    where rsp.responsibility_id = furg.responsibility_id
    and furg.user_id = fur.user_id
    and fur.user_name like nvl(:p_user_id,'%')
    and rsp.responsibility_name like nvl(:p_resp_name,'%')
    and furg.end_date is null
    order of rsp.responsibility_name;

    If you mean for Oracle BI EE, check the repository via Manager, security.

    I hope this helps.

    Good luck

    Daan Bakboord
    http://obibb.WordPress.com

  • Difference between strategies of invalidation "current" and "all"?

    The documentation says that, with close to schema, you can use invalidation-strategy of 'auto', 'present' or 'all '. Auto chooses automatically between these, you can explicitly specify. They are explained:

    * present - load the cache close to listen for events from the background affecting only the items currently in the frontal plane.
    This strategy works best when the cluster nodes are models of post-its data access (for example, HTTP session with a sticky load balancer management).

    * all - load the cache close to listen to all the events in the background.

    Me being new consistency, could someone explain this a little more, in more general terms. My interest is the integrity and security. The two 'present' and 'all' uncondinitionally to gurantee that stale data is never recovered with a "get"? Can someone list the steps that are made for:

    -locate copies of data when a put option is initiated
    -block copies of data, blocking and preventing all waiting for simultaneous operations to stale data
    -Update or delete the copies with the new data "put."
    -validation/return "put".
    -unlock copies, CV additional simultaneous blocked 'get' or ' operations to the

    I don't assume the applications are in need of care? I guess it's all done automatically through consistency, and any delay locking is always more than a few milliseconds for small items (~ 1 KB).

    Hello

    user12252779 wrote:
    Thank you very much for your explanation.

    But I see on the photo here

    http://coherence.Oracle.com/display/COH35UG/near+cache

    that there is a physical copy in the local cache AND another copy in distributed cache even if backup-meter ('primary') is zero.

    Yes, this local cache is the card before the cache close, and as I said, this copy is cancelled before the call to put () returns.

    What I am not undersatand regarding this photo is the difference between the 'present' invalidation strategies and "all".

    Invalidation strategy 'All' means that the front near cache card would get events invalidation on all changes which is located in the back cover, even if they're not interested. It takes less processing of the entry node owner, but slightly longer average processing (invalidation of treatment for not present inputs is done also) to the front near cache cards and also means that network traffic generated from the other cases.

    The 'Present' defeat strategy means that front near cache map would be subscription and churn of change on each entry, there in his card before. It would mean that much less traffic is generated and the front plane fact that invalidation of treatment that is actually needed (for the present entries in the frontal plane), and no unnecessary network traffic is generated. However, this means that the subscription and unsubscription is required (this is network traffic) and also there would be a large number of records of the listener in the storage node that consumes memory.

    There is nothing about these figures, which shows the difference between the two strategies.

    The difference is that in this case, memory consumption is higher and subscription/unsubscription is made (through the network), while with all cards before receive invalidation events who don't care, they still need to make and consume those messages network bandwidth unnecessarily.

    > And what you mean "...". You should always write your code guard that several independent operations are run independently indeed... » ? You're just saying that in this type in any of the shared data: one must be aware, that the data can be changed by someone else while you use, even if you are guaranteed to get updated data every time that access you the data shared with the appropriate API? (Unless of course you have used some explicit locking API.)

    Any data that you get from a distributed cache will be yours only, no one else will share a copy of these objects. (This is not true for the near cache, however. Same object reference can be shared between multiple threads in the same JVM see the same State of the object returned from the cache near)

    What I wanted with the section in quotes is more as if you are doing several gets, the result for the two operations look from the same point in time.

    Best regards

    Robert

  • Report icon that appears between the http: box box and google is missing

    In the old version of Firefox the report security icon (Trusteer endpoint protection) is located between the http; area search and the google search box. Use the report to protect a site I just clicked on the icon and asked him to protect. The icon is not visible in the latest version of Firefox, although the software is still loaded. It's on Windows 7 but on a XP machine, the icon is still there?

    You may have an older version installed. While Firefox is closed, install the latest version.

    If this does not resolve the problem, right-click on an empty area of the tab bar and select Customize. Drag the icon from the palette on a toolbar.

    If that doesn't help either,

    1. Type of topic: support in the address bar and press ENTER.
    2. Click the display folder. Opens in a window of Windows Explorer with your profile folder.
    3. Release of Firefox.
    4. Delete the file localstore.rdf in the profile folder.
    5. Launch Firefox and new right click on an empty area of the tab bar and choose Customize, then drag the icon from the palette on a toolbar.

    If the problem persists, contact the author of the add - we support at the link above.

  • Differences between iPhone he'S / has and MY game

    Hello. What is the difference between iphone he'S / has and MY sets in terms of quality? I am aware of the question of warranty iphone have only guaranteed local. I just want to know about their quality. For me, I think that all of the iphone are the same. My country people always argue about this question. That's all, thank you.

    The LL / a suffix simply indicates the region where the phone is to be used, in this case USA. It's not, somehow indicates the quality of the phone.

  • empty space between the scroll bar horizontally and toolbar Add on

    A blank grey bar appears at the bottom of my screen/window between the horizontal scroll bar and the bar of State/add-on.

    The grey area empty is just under 1/2 inch from top and runs the entire width of the screen/window, less the left sidebar.

    When I go to this bar, nothing happens.
    When I right click in this field, nothing happens.

    This empty gray bar appears on every site I visit in the same exact location, which means that it is a matter of Firefox, not only isolated to a single Web site.

    Disabled add-ons to see if space disappears.
    None of my modules had an effect of this area of the screen/window.
    The empty grey area is still visible.

    Create a new profile as a test to see if your profile is the source of the problems.

    See "basic troubleshooting: a new profile:

    There may be extensions and plugins installed by default in a new profile, so check that in "tools > Modules > Extensions & Plugins" in case there are still problems.

    If this new profile works then you can transfer files from the old profile to the new profile, but make sure not to copy corrupted files.

    See:

  • What is the relationship between the library of Photos and the iPhoto library?

    I'm asking this question here because I can't find all the relevant information online.

    I was dealing with imac a client recently who had a full boot drive. I noticed that his old iPhoto library used 126GB while she had already made the transition to the Photos. His photo library said that he was using a lot more (200 + if I remember correctly). I copied the iPhoto on an external drive library and deleted. Then, I opened the contents of the package and imported pictures remains in program pictures to make sure that I wasn't actually remove all of his memories. Once the work is finished, I was surprised to see that there are more than 6 GB of free space on his computer. What gives? Is there a relationship between the old iPhoto library and new photo library? If so, what is it? Is what I did without danger? I understand at the time that she will not be able to return to iPhoto. But what I'm missing?

    Thanks in advance for your comments.

    No - they are totally separate - connection or relationship of any kind is not

    or the other can be deleted without any effect on the other - but it won't save much space at all and is not recommended - which is exactly what you have seen- Photos saves disk space to share images with your iPhoto or Aperture - Apple Support libraries

    LN

  • Pavilion 10-n102ne: difference between the Pavilion 10-n102ne and 10-n102na

    I want to order a cover for my device (Pavilion 10-n102ne), but did not, on the contrary, I think I found a similar device (10-n102na), so I was wondering what is the difference between these 2 models, not vs na, what it means. The recovery kit works on my device.

    What is the differnce between Recovery Kit or by creating a windows recovery disk, and which should I choose if I want to completely format the system and install another OS?

    Another question is that how do I backup my Windows 10 activation, or is it when I install freshly a Windows 10 the appliance will automatically activate windows? is the serial imprented into bios?

    Awaiting your response

    @ChristopherED
    Welcome to the Forums of HP,
    I hope you're well

    If I understand correctly you want to know about the difference between the Pavilion 10-n102ne and 10-n102na.

    Here is the link with the characteristics of the two products (spot the difference):

    HP Pavilion x 2-10-n102na
    HP Pavilion x 2-10-n102ne

    It is not very different between the recovery kit or one created by your computer apart from the type of creation, if the media created on your computer do not work you can always get one from HP, but you cannot create a new computer because it allows only a creation of media recovery on your computer.

    And the answer to your question about activation, you are right, that the activation code is printed/saved to BIOS if you do not have an option to save as.

    If I helped you to solve the problem, feel free to give me a virtual h.o.t. by clicking on the 'Thumbs Up' icon below.
    Thanks for posting in the Forum from HP Support.  Have a great day!
    Kind regards

  • What is the difference between the NI USB-4431 and NI USB-4432?

    What is the difference between the NI USB-4431 and NI USB-4432?

    I know NI USB-4432, but I do not know NI USB-4431.

    Hello

    Sorry for my previous post don't bother her.

    The usb-4431:

    • 4 analog inputs
    • analog output of 24-bit DAC

    Kind regards

  • Difference between software malicious removal tool and Windows Defender

    What is the difference between the difference between software malware removal tool and Windows Defender?

    Windows Defender is a program that you install on your computer.  It runs automatically and continuously, prevention of new infections of spyware and the removal of the 'old'.

    Microsoft Malicious Software Removal Tool is not installed and does not work automatically.  You can run it manually to remove specific malicious software it is seeking.

    Boulder computer Maven
    Most Microsoft Valuable Professional

  • What is the difference between the external SCSI cables and cables data acquisition

    Hi all, I would like to make a simple extension using an external SCSI cable and a NOR 184749/SH 6868. In other words, it would be: female HD68 bolt of the cable ends OR coupled to an external SCSI HD 68 male with a VHDCI 68 male cable. What are the differences between the external SCSI cables and cables as the (M) 6868EP of the CHS data acquisition. Other than the sex of the end of HD68 is usually on one. How is the posting hit buy using an external SCSI cable for an extension to tell a BNC-2090?

    Yes, I realize that NEITHER wants us to buy their cable, but in these economic times difficult, to do use all available resources, so I have to try,.

    Thank you

    joelowwatt

    Hello

    As long as you have compatible connectors, SCSI cables will work DAQ of basic functions.  They have the advantage of NO cables is that we can meet our DAQ hardware.  So, we can create pairs twisted differential pairs to HAVE, using the ground for shielding terminals and generally specialize the cable to minimize noise and crosstalk.  Because the SCSI cables are not specialized, you are likely to see the most noise and, if you go the sampling rates more Rapids, crosstalk.  If you are in a laboratory or factory with a good amount of noise EMF that your readings are not quite as clean, or if you have fluorescent lights you might see 60 Hz noise you might not see otherwise.

    If you want more details on the specifications of the SH68-68-EPM cable, I recommend these two articles.  The first example of the twisted pair and the principles of the SH cable shielding and the second gives the most precise specifications that you can compare with when looking for a SCSI cable.

    3GRD4C33 Knowledge Base: mapping list of the sons of SHC68-68-EPM & SH68-68-EPM cable

    1TGEHPDM knowledge base: detailed specifications for the SH68-68-EP cable

    Kind regards

  • dad bought me a computer PORTABLE from NUTRIGEST I HAVE BEEN out of the CITY FOR SOME TIME AND LATER BETWEEN the AUTHENTICITY CODE PRODUCT, AND IT's not SAYIING VALID, BUT I KNOW THAT CANT BE REAL CODE IS

    dad bought me a computer PORTABLE from NUTRIGEST I HAVE BEEN out of the CITY FOR SOME TIME AND LATER BETWEEN the AUTHENTICITY CODE PRODUCT, AND IT's not SAYIING VALID, BUT I KNOW THAT can NOT BE TRUE

    If it is a new machine call or go to circuit city and get them fixed.  If they sold you the laptop, indicating that it included Windows XP then the onus is on them that provide you a valid COA and the product key.

    John

Maybe you are looking for