Saturday, 31 December 2016

The neo-MUD tunnel for OBIEE 11g automated RPD deployment

Ok call me a geek for writing this blog on new year's eve, I dont care :-P. I can tell you that this blog is totally worth it. 
We know that EM can be used for deployment but we had a requirement to maintain an automated log every time a deployment is done with mandatory comments from the developer and link the deployment to a backed up RPD so that we can keep a track of the changes been done to the RPD and revert back if necessary.
I developed the  Multi User DEPLOYMENT (not Development) tunnel a.k.a neo-MUD tunnel utility to meet this requirement. We will talk about the process to implement the neo-MUD tunnel in this blog.


Sunday, 7 August 2016

OBIEE 11g: Outer join in the Physical Layer now possible

We know that we can perform outer joins in OBIEE in the Logical Layer. The problem with this mechanism is that it is not possible for one logical table sources (LTS) to join to a fact by an inner join and the other to join to the fact by an outer join. Let us try to solve this problem here.

Saturday, 12 March 2016

Issue in using EJB Actions in OBIEE 11.1.1.9

This blog is less about a solution and more about an information.

If you have written an EJB that uses a obiee report saved in the catalog as an arguement and you are trying to invoke this EJB using Actions in OBIEE 11.1.1.9 then you might get the following error.

Monday, 7 March 2016

Migrating application roles in OBIEE 11g

My last article talked about a maintenance and hassle free mechanism to implement security. The article moved the security architecture to roles created in EM. The next logical step is to move the roles from one environment to another because lets face it, manually creating roles is a lot of effort.

Sunday, 14 February 2016

Maintenance free security implementation in OBIEE 11g

This blog talks about a hassle free mechanism of OBIEE security implementation with almost zero overhead.
We will first look at the data level security implementation and then extend it to object level security.