4 Ways to Manage Authentication for SAP BusinessObjects Enterprise
- by Adam Getz, Manager – Business Intelligence, CGI Federal
- December 20, 2012
Sort out the authentication options offered for BusinessObjects Enterprise and see how to use them.
Authentication is the process of verifying the identity of a user who attempts to access the system.
SAP BusinessObjects Enterprise provides several authentication methods for enabling users to log on to the application and for providing secure report access. BusinessObjects contains its own user names and passwords as part of a security model known as enterprise authentication. The system also integrates with third-party authentication tools, including Microsoft Windows Active Directory (AD), Light-Weight Directory Access Protocol (LDAP), and SAP ERP systems.
Use of the external authentication tools eliminates the need to re-create and maintain individual user and group accounts within BusinessObjects Enterprise. This convenient feature saves time for both the administrator and end users of BusinessObjects Enterprise.
BusinessObjects Enterprise also supports single sign-on or trusted authentication for both the Windows NT and Windows AD methods, so users of BusinessObjects do not have to re-enter their log-on credentials after already logging on to the operating system. When a user logs on to the operating system, a security context for that user is created, and the user can seamlessly connect to BusinessObjects.
The reason BusinessObjects Enterprise supports several security models in addition to its own security model is simple: It is more efficient to use entities, such as user accounts and passwords that already exist outside of BusinessObjects Enterprise. Fortunately, none of these security options are mutually exclusive; they can all be used simultaneously.
Would you like to see this full item?