ABE-IPSABE HOLDINGABE BOOKS
English Polski
On-line access

Bookstore

0.00 PLN
Bookshelf (0) 
Your bookshelf is empty
SAP BusinessObjects BI Security: Keep Your BOBJ Safe

SAP BusinessObjects BI Security: Keep Your BOBJ Safe

Authors
Publisher Rheinwerk Verlag
Year 18/01/2013
Pages 562
Version hardback
Language English
ISBN 9781592294374
Categories
Delivery to United States

check shipping prices
Ask about the product
Email
question
  Send
Add to bookshelf

Book description

How secure is your SAP BusinessObjects environment? Find out with this book, which will shore up your understanding of the basic concepts involved in securing data and teach you the practical, technical steps you'll need. Explore the frameworks, properties, and data sources of the SAP BusinessObjects suite. Up to date for release 4.0 FP3 and applicable to earlier releases, this comprehensive guide is the key to locking down your system. Highlights Include: SAP NetWeaver BW, LDAP, and Active Directory authentication Single sign-on Rights framework and inheritance model Access levels General and specific rights Secured connections Universe security Access restriction Data and business security profile Scheduling, publications, and personalization profile

SAP BusinessObjects BI Security: Keep Your BOBJ Safe

Table of contents



Acknowledgments ... 21


1. Introduction to Security in SAP BusinessObjects Business Intelligence 4.0 ... 23



1.1 ... Business Intelligence Overview ... 23

1.2 ... System Security Considerations ... 24

1.3 ... A Brief History of Business Objects ... 26

1.4 ... SAP BusinessObjects Business Intelligence 4.0 Review ... 27

1.5 ... Book Roadmap ... 29



2. Administration and Security ... 33



2.1 ... BI 4.0 Deployment ... 34

2.2 ... BI 4.0 Installation ... 36

2.3 ... Administration Tools ... 44

2.4 ... CMS Repository and File Repository Server ... 47

2.5 ... Cryptography ... 53

2.6 ... BI 4.0 Servers ... 58

2.7 ... Auditing ... 62

2.8 ... Summary ... 65



3. Users and Authentication ... 67



3.1 ... User Authentication ... 68

3.2 ... Enterprise Users and Groups ... 73

3.3 ... Managing Users and Groups in the CMC ... 80

3.4 ... Trusted Authentication ... 94

3.5 ... Aliases and External Authentications ... 99

3.6 ... Managing Aliases in the CMC ... 106

3.7 ... Managing LDAP Authentication in the CMC ... 111

3.8 ... Managing Active Directory Authentication ... 121

3.9 ... Summary ... 142



4. Rights Framework ... 145



4.1 ... Assigned Rights ... 145

4.2 ... General and Specific Rights ... 146

4.3 ... Inheritance ... 148

4.4 ... Non-Owner and Owner Versions of Rights ... 155

4.5 ... Objects General Rights ... 157

4.6 ... Application General Rights ... 163

4.7 ... Managing Rights in the CMC ... 165

4.8 ... Access Levels ... 171

4.9 ... Managing Access Level in the CMC ... 175

4.10 ... Running Administration Queries in the CMC ... 181

4.11 ... Summary ... 185



5. Applications and Rights Reference ... 187



5.1 ... Applications List ... 188

5.2 ... System Objects List ... 194

5.3 ... Content Object List ... 196

5.4 ... Analysis, Edition for OLAP ... 199

5.5 ... BEx Web Applications ... 200

5.6 ... BI Launch Pad ... 200

5.7 ... Widgets ... 202

5.8 ... BI Workspaces ... 203

5.9 ... Central Management Console ... 206

5.10 ... SAP Crystal Reports ... 207

5.11 ... Explorer ... 209

5.12 ... Information Design Tool ... 221

5.13 ... Promotion Management ... 228

5.14 ... SAP BusinessObjects Mobile ... 236

5.15 ... SAP StreamWork ... 237

5.16 ... Universe Design Tool ... 238

5.17 ... Version Management ... 244

5.18 ... Visual Difference ... 249

5.19 ... Web Intelligence ... 250

5.20 ... Users and Groups ... 277

5.21 ... Connections ... 279

5.22 ... Note Rights ... 283

5.23 ... Schedule Output Format ... 284

5.24 ... Summary ... 285



6. Connections and Database Authentications ... 287



6.1 ... Secured Connections ... 288

6.2 ... Local Connections ... 293

6.3 ... Connection Authentication Mode ... 295

6.4 ... Using Credentials Mapping for Single Sign-On ... 301

6.5 ... Managing Connections ... 303

6.6 ... Summary ... 314



7. Universe Security in Universe Design Tool ... 317



7.1 ... Universe ... 318

7.2 ... Using Filters on Table, Object, Class, or Universe ... 323

7.3 ... Using Filters in Universe Design Tool ... 325

7.4 ... Access Restriction Definition ... 330

7.5 ... Access Restriction Aggregation ... 337

7.6 ... Managing Access Restrictions in Universe Design Tool ... 339

7.7 ... Object Access Level ... 354

7.8 ... Managing Object Access Levels ... 355

7.9 ... Summary ... 359



8. Universe Security in Information Design Tool ... 361



8.1 ... Introduction to New Universe ... 362

8.2 ... Defining WHERE Clauses and Filters in Information Design Tool ... 366

8.3 ... Security Profiles ... 370

8.4 ... Data Security Profiles ... 375

8.5 ... Business Security Profiles ... 382

8.6 ... Managing Security Profiles in Information Design Tool ... 395

8.7 ... Object Access Level ... 431

8.8 ... User Attributes ... 434

8.9 ... Managing User Attributes in the CMC ... 436

8.10 ... Running a Secured Query ... 439

8.11 ... Summary ... 441



9. Scheduling and Publishing ... 443



9.1 ... Scheduling and Publishing Framework ... 444

9.2 ... Scheduling ... 445

9.3 ... Publishing ... 449

9.4 ... Publication Recipients ... 452

9.5 ... Publication Personalization and Profile ... 456

9.6 ... Report Bursting Options ... 463

9.7 ... Summary ... 466



10. Security for SAP NetWeaver BW Data Sources ... 467



10.1 ... SAP Authentication ... 468

10.2 ... Configuring SAP Authentication ... 475

10.3 ... SAP Connections ... 482

10.4 ... Creating SAP NetWeaver BW Connections ... 486

10.5 ... SAP Authentication and Single Sign-On ... 494

10.6 ... SNC and STS ... 495

10.7 ... Configuring STS ... 498

10.8 ... User Attributes ... 505

10.9 ... Summary ... 505



11. Defining and Implementing a Security Model ... 507



11.1 ... General Recommendations ... 507

11.2 ... Defining Users and Groups ... 509

11.3 ... Defining Folders and Objects ... 511

11.4 ... Defining Rights ... 512

11.5 ... Defining Access Levels ... 514

11.6 ... Mandatory Rights for Common Workflows ... 517

11.7 ... Setting Security for External Groups ... 521

11.8 ... Delegated Administration ... 522

11.9 ... Defining Database Filtering ... 525

11.10 ... Universe Security ... 527

11.11 ... Combined Authentication ... 531

11.12 ... Testing a Security Model ... 533

11.13 ... Summary ... 534



Appendices ... 535



A ... Universe Comparison and Conversion ... 535

B ... The Authors ... 551



Index ... 553

We also recommend books

Strony www Białystok Warszawa
801 777 223