Oracle Hyperion Users Group Presentation - Bank of America
Oracle Hyperion Users Group Presentation - Bank of America
Oracle Hyperion Users Group Presentation - Bank of America
Agenda Introduction
Mike Babb, Senior Technology Manager Darren Purdy, Technology Manager Carey Worth, Senior Service Delivery Manager
Business Intelligence at Bank of America Technology Cost Allocations OBIEE with Essbase & Relational Human Resources Analytics OBIEE with Exadata
Overview & Infrastructure Security
Q&A
2
Bank of America Today $2T in assets; $83B in revenue 5,500 retail banking offices 16,300 ATMs 270,000 employees in 40 countries $36B labor and related costs $4B in data processing and telecom costs
Vendor Preferred
Business Objects
Businesses supported
Human Resources Technology Finance Infrastructure Finance
5
How to report by
Seller view Buyer view Product view Inventory (server/hostname) view Manager (span of control) view
Originally built with OBIEE 10 Migrated to OBIEE 11g (11.1.1.3) OBIEE as Export tool Run on Entry
10
11
12
Technical Challenges
Bandwidth limitations and resource throttling Contention amongst applications for system resources Cobbled collection of code and technologies for ETL and analytics Lack of cohesive data model Expansion non-trivial and cost prohibitive
12.7
14.5
15 Improvement Factor
20
25
30
17
Local disk for Instances & Cache Benefits Resources Licensing Maintenance
SSO
Siteminder is bank standard for all web Apps
Weblogic
JVMs rolled out as part of OBI config for each new app that comes on board
OBI Schemas
One DB for all instances
20
3) Services are stopped, RPD pulled from shared location to each Instance
2) Automated pull of RPD from source control 1) Inbound WebCat replications stop from production site 5) Enable WebCat replication to primary
Row Level
Applies a filter a report query based on a user data level access Implemented with the repository by adding filters with special variables to table objects Limits the rows of data return based on the filter (i.e. user with North region will only see that regions data)
Object level
The ability to grant or deny access to application features, reports and dashboards Implemented within the presentation catalog User are assigned to group Groups are granted or denied access to presentation objects.
Database level
Uses Oracles Virtual Private Database feature to restrict access to query a physical database table Implemented within the database
Access requests needed to be automated Managers should not have to request access for their span of control Users should not be allowed to see compensation data of their peers Super users should be able to see all data Database administrators should not see HR compensation data Non-managers needing access to HR data should not gain access to their peers data User should be able to see all records for associate who transferred out of their organization but not see certain confidential category groups Detailed confidential data must always be secured, but aggregated forms of that data are not confidential in most cases and should be visible even to those that are not allowed to see the detail data
Implicit Access
Object Level
All managers receive access to Workforce Profile Dashboards and detailed reports by default. Managers do not receive access to payroll, benefits, national ID and diversity data for their span of control records
Data Level All managers receive implicit access to their span of control data.
Implicit Access
All managers receive implicit access to their span of control data. Managers do not receive access to Payroll, benefits, national ID, diversity access for their span of control records Managers do not receive access to confidential data for BA Continuum aligned associates
Explicit Access
Explicit Object Level
Explicit access to the following objects is granted based on groups: Subject areas Presentation tables Presentation table columns Users belonging to particular group should see a certain set of dashboards/reports.
Explicit Access
Explicit Data Level
Select specific categories to gain access within security access tool Explicit access granted will not change (add or take away) any implicit access granted Row level will be provisioned by data category. Row level access will not be provisioned at an individual field level.
Specify a row level for non-confidential data and a different row level for each of the confidential data categories for which the user has access
Confidential data categories will have sub-categories for the organization, country and manager inclusions
Special security for transfers/detail change data Allow users to see associates who transfer out of the LOB they are supporting Users will not see confidential data for associates who transfer out of the LOB they support.
Questions?
33