Search

1 to 4 of 4
Sort by

Library Entry
TL OATUG and the User Management /Role Based Access SIG: User Management Part III-Automate User Creation and Role Assignments

Presenter Information: Susan Behn, Vice President, Infosemantics Recording Date: Friday, 16 August 2019 3:00 pm ET Duration: 1 Hour Learn how to reduce system administration bottlenecks by automating the process of creating users and assigning responsibilities. Also learn to delegate...

2019-08-16 15.01 TL OATUG and the User Management _ Role Based Access SIG_User Management Part III-Automate User Creation and Role Assignments.mp4


Library Entry
TL OATUG and the User Management / Role Based Access SIG : User Management Part II - Security Wizards and Proxy Users

Panelist Information: Chad Johnson, DBA, Polk County Florida, BoCC Recording Date: Friday, 09 August 2019 3:00 pm ET Duration: 1 Hour Learn how to utilize security wizards which allow you to create Grants through a guided navigation path to allow access to value sets, concurrent reports...

2019-08-09 15.00 TL OATUG and the User Management _ Role Based Access SIG _ User Management Part II - Security Wizards and Proxy Users.mp4


Library Entry
TL OATUG and User Management / Role Based Access Control SIG: User Management/Role Based Access Control Part 1 for Beginners

Panelist Information: Susan Behn, Infosemantics Recording Date: Friday, 26 July 2019 Duration: 1 Hour Learn the basics of user management and role-based access control starting with terminology and continuing on to basic examples. Learn where it is required, where it is optional and...

2 attachments


Library Entry
Role Securities in Procurement and Spend Analytics

By Joshua Nurkowski Role-based security and data-level security can be established using OBIA to obtain metrics and data within corporate procurement. #Oracle Business Intelligence Analytics #OBIA #Role Security #Analytics #OBIEE #Data #Reporting #Dashboard #Procurement ...

2017, Q2_Role Securities in Procurement and Spend Analytics - Summer 17.pdf