SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)
SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)
[ MIKE NARDUCCI
[ PHIL AWTRY
[ STEPHANIE CLUNE
[ Breakout Description
In this presentation, learn how the SAP BusinessObjects security model works. Leverage features, such as inheritance, scope of rights, and custom access levels, to secure the business intelligence system, while reducing overall complexity and maintenance. Techniques will be demonstrated using SAP BusinessObjects XI that are also applicable to SAP BusinessObjects Edge BI. Real-world scenarios drive home the concepts learned and give each attendee the confidence to implement the same techniques back home.
Industry Expertise
100+ clients Multiple projects with many Clients 400+ successful projects
[ Poll
By a show of hands, are you: Not currently running SAP BusinessObjects? Using classic version 6.x and earlier? Crystal Enterprise 10 and earlier? SAP BusinessObjects Edge BI? SAP BusinessObjects Enterprise XI R2? SAP BusinessObjects Enterprise XI 3.0? SAP BusinessObjects Enterprise XI 3.1 SP2 or higher? SAP BusinessObjects 4.0 (beta)?
[ Agenda
Comparing XI R2 and XI 3.x Security SAP BusinessObjects Security Basics Demonstration
Custom Access Levels, Permissions Explorer and Security Query
[ Security Features
Feature Folder Inheritance Group Inheritance Predefined Access Levels No Access View Schedule View On Demand Full Control Advanced Rights Custom Access Levels Break Inheritance Scope of Rights Combined Access Levels XI R2 yes yes yes yes yes yes yes yes yes no yes no no XI 3.x yes yes yes yes* yes yes yes yes yes yes yes yes yes
[ Security Applications
Application Central Management Console Web Component Adapter (WCA) Administrative Launchpad Query Builder Security Viewer Add-on Security Query Permissions Explorer XI R2 yes yes yes yes yes no no XI 3.x yes! no no yes no yes yes
SECURITY BASICS
[ Terminology
Principal a user or group Rights override - a rights behavior in which rights that are set on child objects override the rights set on parent objects General Global Rights access rights enforced regardless of content type Content Specific Rights access rights unique to content type (Crystal Report, Web Intelligence, etc)
[ Predefined Rights
Rights Option
Description Unable to access an object Able to view historical (scheduled) instances of an object Able to schedule instances of an object Able to view live data on-demand Able to change or delete an object
[ Advanced/Granular Rights
Rights Option Granted Denied Description The right is granted to a principal. The right is denied to a principal. The right is unspecified for a principal. By default, rights set to Not Specified are denied. The right applies to the object. This option becomes available when you click Granted or Denied. The right applies to sub-objects. This option becomes available when you click Granted or Denied. XI R2 yes yes XI 3.x yes yes
Not Specified
yes
yes
Apply to Object
no
yes
Apply to Sub-Objects
no
yes
[ Folder Inheritance
Global Rights
Subfolder Object
NOTE: In XI R2, global rights are set on the Rights tab in the Settings management area. In XI 3.x, global rights are set in the Folders management area as All Folders Security
Subfolder Object
Object
eFashion East
eFashion South
eFashion West
Barrett
Richards
Larry
Leonard
Bennett
Steve
[ Breaking Inheritance
Still possible in XI 3.x as it was in XI Release 2 Can disable folder inheritance, group inheritance, or both May not be as necessary in XI 3.x because of new scope of rights features
[ Scope of Rights
Scope of rights new in XI 3.x, the ability to limit the extent of rights inheritance (Apply to Object, Apply to Sub-object) In BusinessObjects Enterprise XI R2, the administrator was forced to break inheritance when they wanted to give user rights to child folders that were different to those given to the parent folder In XI 3.x, rights are effective for both the parent object and the child objects by default (same as XI R2). However
[ Permissions Explorer
Query Principal - the user or group that you want to run the security query for. You can specify one principal for each security query
Query Permission - the right or rights you want to run the security query for, the status of these rights, and the object type these rights are set on
BEST PRACTICES
NEXT STEPS
36
37
[ Recommended Reading
SAP BusinessObjects Enterprise Administrators Guide SAP BusinessObjects Enterprise XI 3.0/3.1 Upgrade Guide SAP BusinessObjects 5/6 to XI 3.1 Migration Guide
38
[ Relevant Education
SAP BusinessObjects Enterprise XI 3.0/3.1: Administration and Security
2 days - course code BOE310
Official SAP BusinessObjects curriculum is available on-site at your location or at authorized education centers around the world.
39
]
40
Dallas Marks
Senior Consultant & Trainer Quorum Business Solutions [email protected] http://www.dallasmarks.org/blog/
For more information about Quorum Business Solutions: http://www.qbsol.com/ [email protected] 713.430.8601