How secure is your SAP BusinessObjects environment? Find out with this book, which will shore up your understanding of the basic concepts involved in securing data and teach you the practical, technical steps you'll need. Explore the frameworks, properties, and data sources of the SAP BusinessObjects suite. Up to date for release 4.0 FP3 and applicable to earlier releases, this comprehensive guide is the key to locking down your system.
Highlights Include:
SAP NetWeaver BW, LDAP, and Active Directory authentication
Single sign-on
Rights framework and inheritance model
Access levels
General and specific rights
Secured connections
Universe security
Access restriction
Data and business security profile
Scheduling, publications, and personalization profile
SAP BusinessObjects BI Security: Keep Your BOBJ Safe
Table of contents
Acknowledgments ... 21
1. Introduction to Security in SAP BusinessObjects Business Intelligence 4.0 ... 23
1.1 ... Business Intelligence Overview ... 23
1.2 ... System Security Considerations ... 24
1.3 ... A Brief History of Business Objects ... 26
1.4 ... SAP BusinessObjects Business Intelligence 4.0 Review ... 27
1.5 ... Book Roadmap ... 29
2. Administration and Security ... 33
2.1 ... BI 4.0 Deployment ... 34
2.2 ... BI 4.0 Installation ... 36
2.3 ... Administration Tools ... 44
2.4 ... CMS Repository and File Repository Server ... 47
2.5 ... Cryptography ... 53
2.6 ... BI 4.0 Servers ... 58
2.7 ... Auditing ... 62
2.8 ... Summary ... 65
3. Users and Authentication ... 67
3.1 ... User Authentication ... 68
3.2 ... Enterprise Users and Groups ... 73
3.3 ... Managing Users and Groups in the CMC ... 80
3.4 ... Trusted Authentication ... 94
3.5 ... Aliases and External Authentications ... 99
3.6 ... Managing Aliases in the CMC ... 106
3.7 ... Managing LDAP Authentication in the CMC ... 111
3.8 ... Managing Active Directory Authentication ... 121
3.9 ... Summary ... 142
4. Rights Framework ... 145
4.1 ... Assigned Rights ... 145
4.2 ... General and Specific Rights ... 146
4.3 ... Inheritance ... 148
4.4 ... Non-Owner and Owner Versions of Rights ... 155
4.5 ... Objects General Rights ... 157
4.6 ... Application General Rights ... 163
4.7 ... Managing Rights in the CMC ... 165
4.8 ... Access Levels ... 171
4.9 ... Managing Access Level in the CMC ... 175
4.10 ... Running Administration Queries in the CMC ... 181
4.11 ... Summary ... 185
5. Applications and Rights Reference ... 187
5.1 ... Applications List ... 188
5.2 ... System Objects List ... 194
5.3 ... Content Object List ... 196
5.4 ... Analysis, Edition for OLAP ... 199
5.5 ... BEx Web Applications ... 200
5.6 ... BI Launch Pad ... 200
5.7 ... Widgets ... 202
5.8 ... BI Workspaces ... 203
5.9 ... Central Management Console ... 206
5.10 ... SAP Crystal Reports ... 207
5.11 ... Explorer ... 209
5.12 ... Information Design Tool ... 221
5.13 ... Promotion Management ... 228
5.14 ... SAP BusinessObjects Mobile ... 236
5.15 ... SAP StreamWork ... 237
5.16 ... Universe Design Tool ... 238
5.17 ... Version Management ... 244
5.18 ... Visual Difference ... 249
5.19 ... Web Intelligence ... 250
5.20 ... Users and Groups ... 277
5.21 ... Connections ... 279
5.22 ... Note Rights ... 283
5.23 ... Schedule Output Format ... 284
5.24 ... Summary ... 285
6. Connections and Database Authentications ... 287
6.1 ... Secured Connections ... 288
6.2 ... Local Connections ... 293
6.3 ... Connection Authentication Mode ... 295
6.4 ... Using Credentials Mapping for Single Sign-On ... 301
6.5 ... Managing Connections ... 303
6.6 ... Summary ... 314
7. Universe Security in Universe Design Tool ... 317
7.1 ... Universe ... 318
7.2 ... Using Filters on Table, Object, Class, or Universe ... 323
7.3 ... Using Filters in Universe Design Tool ... 325