Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This section contains overviews of the Business Data Catalog authentication and authorization models.
In this section
- Business Data Catalog Authentication
Describes the two authentication patterns you can use to authenticate Business Data Catalog users: Trusted Subsystem, and Impersonation and Delegation.
- Business Data Catalog Authorization
Explains the two authorization patterns you can use to control user access to data managed by the Business Data Catalog: back-end authorization and middle-tier authorization.