You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Oracle BI Applications 11g with ODI migration to Oracle OCI with ODI, OAC and Oracle DB
2
+
3
+
This repository contains an in-depth guide on how to define and design a Data Warehouse Analytical workload when migrating from an Oracle BI Applications (OBIA) 11g with ODI to Oracle OCI with ODI, Oracle Analytics Cloud (OAC) and Oracle Database
4
+
5
+
## When to use this asset?
6
+
7
+
Use this asset when planning a migration of OBIA 11g with ODI to Oracle OCI with OAC, ODI and Oracle Database.
8
+
9
+
## Instructions for Utilizing This Asset
10
+
11
+
Use this document as a starting point for the solution definition of an OBIA 11g to OCI with OAC, IDMC and Oracle DB implementation project.
12
+
13
+
This asset contains sample content for defining a project to deploy the workload and it is just an example and should be used as such. Project scope, timelines, and deliverables will always need to be defined and agreed upon with the Customer on a case-by-case basis.
14
+
15
+
This asset includes example architecture diagrams for DrawIO in the [files/images subdirectory](files/images).
16
+
17
+
Following information is important when migrating OBIA 11g or 12c to OCI:
| Related support notes | 13 Jan 2023 | OBIA 11g: Oracle BI Applications on Cloud Services – Deployment Options (Doc ID [2264063.1](https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=448725079990793&id=2264063.1&_adf.ctrl-state=jppmkcof8_222))OBIA 11g: Oracle BI Applications Installation on PaaS with Oracle Analytics Cloud (OAC) (Doc ID [2254057.1](https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=448768767008674&id=2254057.1&_adf.ctrl-state=jppmkcof8_279)) OBIA: Oracle BI Applications on Platform as a Service (PaaS) - Best Practices (Doc ID [2230192.1](https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=448803716828230&id=2230192.1&_adf.ctrl-state=jppmkcof8_336)) |
22
+
| Fusion Middleware Lifetime support document | 10 Jan 2023 |[Lifetime Support document (External Link)](https://www.oracle.com/us/support/library/lifetime-support-middleware-069163.pdf)|
23
+
| Related blog posts | 13 Jan 2023 |[OBIA 12c: ODI Customizations Migration Utility](https://blogs.oracle.com/analytics/post/obia-12c-odi-customizations-migration-utility)[Restoring Snapshot data when upgrading to BI APPS 10.3](https://blogs.oracle.com/analytics/post/restoring-snapshot-data-when-upgrading-to-bi-apps-103)|
24
+
25
+
## Conclusion
26
+
27
+
The Oracle BI Applications 11g with ODI migration to Oracle OCI with ODI, OAC and Oracle DB Solution Definition is expected to serve as a leading guide to the project.
28
+
29
+
30
+
31
+
All participants are encouraged to provide feedback, raise queries, and contribute to enhance the overall project's success.
32
+
33
+
### Useful Links
34
+
35
+
This workload uses OCI services that are part of the Oracle Data platform and it can be further augmented with additional services and capabilities that are described on the [Data platform - data lakehouse reference architecture](https://docs.oracle.com/en/solutions/data-platform-lakehouse/index.html#GUID-A328ACEF-30B8-4595-B86F-F27B512744DF).
36
+
37
+
# License
38
+
39
+
Copyright (c) 2023 Oracle and/or its affiliates.
40
+
41
+
Licensed under the Universal Permissive License (UPL), Version 1.0.
Copy file name to clipboardExpand all lines: data-platform/analytical-data-platform-lakehouse/workload-architecture-documents/obia-with-odi-migration-to-oci/wad.md
+102Lines changed: 102 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -209,6 +209,108 @@ A network firewall is a highly available and scalable instance that you create i
209
209
210
210
Above a simple example is presented where a Network Firewall is deployed in a DMZ subnet and for which all incoming traffic via the DRG as well as all the outgoing traffic from the private subnet is routed to the Network Firewall so that policies are enforced to secure traffic.
211
211
212
+
### Mandatory Security Best Practices
213
+
214
+
*Guide:*
215
+
216
+
*Use this text for every engagament. Do not change. Aligned with the Cloud Adoption Framework*
217
+
218
+
The safety of the ExampleCustomer's Oracle Cloud Infrastructure (OCI) environment and data is the ExampleCustomer’s priority.
219
+
220
+
To following table of OCI Security Best Practices lists the recommended topics to provide a secure foundation for every OCI implementation. It applies to new and existing tenancies and should be implemented before the Workload defined in this document will be implemented.
221
+
222
+
Workload related security requirements and settings like tenancy structure, groups, and permissions are defined in the respective chapters.
223
+
224
+
Any deviations from these recommendations needed for the scope of this document will be documented in chapters below. They must be approved by ExampleCustomer.
225
+
226
+
ExampleCustomer is responsible for implementing, managing, and maintaining all listed topics.
227
+
228
+
<tablestyle="width:25%;">
229
+
<colgroup>
230
+
<colstyle="width: 2%" />
231
+
<colstyle="width: 2%" />
232
+
<colstyle="width: 19%" />
233
+
</colgroup>
234
+
<thead>
235
+
<trclass="header">
236
+
<th>CATEGORY</th>
237
+
<th>TOPIC</th>
238
+
<th>DETAILS</th>
239
+
</tr>
240
+
</thead>
241
+
<tbody>
242
+
<trclass="odd">
243
+
<td>User Management</td>
244
+
<td>IAM Default Domain</td>
245
+
<td><p>Multi-factor Authentication (MFA) should be enabled and enforced for every non-federated OCI user account.</p>
246
+
<ul>
247
+
<li>For configuration details see <ahref="https://docs.oracle.com/en-us/iaas/Content/Identity/mfa/understand-multi-factor-authentication.htm">Managing Multi-Factor Authentication</a>.</li>
248
+
</ul>
249
+
<p>In addition to enforce MFA for local users, Adaptive Security will be enabled to track the Risk Score of each user of the Default Domain.</p>
250
+
<ul>
251
+
<li>For configuration details see <ahref="https://docs.oracle.com/en-us/iaas/Content/Identity/adaptivesecurity/overview.htm">Managing Adaptive Security and Risk Providers</a>.</li>
252
+
</ul></td>
253
+
</tr>
254
+
<trclass="even">
255
+
<td></td>
256
+
<td>OCI Emergency Users</td>
257
+
<td><p>A maximum of <strong>three</strong> non-federated OCI user accounts should be present with the following requirements:</p>
258
+
<ul>
259
+
<li>Username does not match any username in the Customer’s Enterprise Identity Management System</li>
260
+
<li>Are real humans.</li>
261
+
<li>Have a recovery email address that differs from the primary email address.</li>
262
+
<li>User capabilities has Local Password enabled only.</li>
263
+
<li>Has MFA enabled and enforced (see IAM Default Domain).</li>
264
+
</ul></td>
265
+
</tr>
266
+
<trclass="odd">
267
+
<td></td>
268
+
<td>OCI Administrators</td>
269
+
<td><p>Daily business OCI Administrators are managed by the Customer’s Enterprise Identity Management System . This system is federated with the IAM Default Domain following these configuration steps:</p>
270
+
<ul>
271
+
<li>Federation Setup</li>
272
+
<li>User Provisioning</li>
273
+
<li>For configuration guidance for major Identity Providers see the OCI IAM Identity Domain tutorials.</li>
274
+
</ul></td>
275
+
</tr>
276
+
<trclass="even">
277
+
<td></td>
278
+
<td>Application Users</td>
279
+
<td>Application users like OS users, Database users, or PaaS users are not managed in the IAM Default Domain but either directly or in dedicated identity domains. These identity domains and users are covered in the Workload design. For additional information see <ahref="https://docs.oracle.com/en-us/iaas/Content/cloud-adoption-framework/iam-security-structure.htm">Design Guidance for IAM Security Structure</a>.</td>
280
+
</tr>
281
+
<trclass="odd">
282
+
<td>Cloud Posture Management</td>
283
+
<td>OCI Cloud Guard</td>
284
+
<td><p>OCI Cloud Guard will be enabled at the root compartment of the tenancy home region. This way it covers all future extensions, like new regions or new compartments, of your tenancy automatically. It will use the Oracle Managed Detector and Responder recipes at the beginning and can be customized by the Customer to fulfil the Customer’s security requirements.</p>
285
+
<ul>
286
+
<li>For configuration details see <ahref="https://docs.oracle.com/en-us/iaas/cloud-guard/using/part-start.htm">Getting Started with Cloud Guard</a>. Customization of the Cloud Guard Detector and Responder recipes to fit with the Customer’s requirements is highly recommended. This step requires thorough planning and decisions to make.</li>
287
+
<li>For configuration details see <ahref="https://docs.oracle.com/en-us/iaas/cloud-guard/using/part-customize.htm">Customizing Cloud Guard Configuration</a></li>
288
+
</ul></td>
289
+
</tr>
290
+
<trclass="even">
291
+
<td></td>
292
+
<td>OCI Vulnerability Scanning Service</td>
293
+
<td><p>In addition to OCI Cloud Guard, the OCI Vulnerability Scanning Service will be enabled at the root compartment in the home region. This service provides vulnerability scanning of all Compute instances once they are created.</p>
294
+
<ul>
295
+
<li>For configuration details see <ahref="https://docs.oracle.com/en-us/iaas/scanning/home.htm">Vulnerability Scanning</a>.</li>
296
+
</ul></td>
297
+
</tr>
298
+
<trclass="odd">
299
+
<td>Monitoring</td>
300
+
<td>SIEM Integration</td>
301
+
<td>Continuous monitoring of OCI resources is key for maintaining the required security level (see <ahref="#regulations-and-compliances-requirements">Regulations and Compliance</a> for specific requirements). See <ahref="https://docs.oracle.com/en-us/iaas/Content/cloud-adoption-framework/siem-integration.htm">Design Guidance for SIEM Integration</a> to implement integration with the existing SIEM system.</td>
302
+
</tr>
303
+
<trclass="even">
304
+
<td>Additional Services</td>
305
+
<td>Budget Control</td>
306
+
<td><p>OCI Budget Control provides an easy to use and quick notification on changes of the tenancy’s budget consumption. It will be configured to quickly identify unexpected usage of the tenancy.</p>
307
+
<ul>
308
+
<li>For configuration details see <ahref="https://docs.oracle.com/en-us/iaas/Content/Billing/Tasks/managingbudgets.htm">Managing Budgets</a></li>
0 commit comments