BusinessObjects Security: Understanding Access Levels

  • by Adam Getz, Manager – Business Intelligence, CGI Federal
  • June 8, 2012
Take a tour of the basic security access levels offered in BusinessObjects, including overviews of how to manage these levels, how to assign advanced rights to users or groups, and how to use inheritance options to save time.
Key Concept

Access levels are predefined sets of component rights that define use of folders, universes, connections, and documents. Access levels allow administrators to set common security levels quickly and uniformly rather than setting individual rights one by one.

Security within BusinessObjects is fairly sophisticated, and an administrator is provided a great deal of control in providing or denying access to the individual components to users and groups. Moreover, component-level security is handled with the assignment of access levels.

BusinessObjects comes installed with a number of predefined access levels: no access, view, schedule, view on demand, and full control. BusinessObjects also enables administrators to develop advanced or custom access levels. 

Access levels in BusinessObjects can be viewed and managed in the access levels component of the BusinessObjects administration tool known as the Central Management Console (CMC).  After logging in to the CMC, an administrator can navigate to the access levels component via the drop-down menu in the top-left corner of the console. From this screen the administrator can view existing access levels, modify access levels, and define new access levels.

Adam Getz

Adam Getz currently serves as a Manager, Business Intelligence for CGI Federal. In this position, he is leading a large business intelligence and data warehousing implementation for a federal client.  He is a thought leader in the field of information technology and an expert in the deployment of leading business intelligence, database management, and data integration products. He has presented at a variety of local, national, and international events, including the 2006 BusinessObjects International Conference, 2007 Oracle BIWA Summit, 2008 Oracle Open World, and 2010 and 2011 ASUG SAP BusinessObjects User Conferences. In addition, Adam is the creator and main author of bi-insider.com, a website, portfolio, and blog that provides rich technical and functional content to business intelligence and data warehousing professionals. He has also published numerous technology white papers that have focused on various topics within business intelligence and data warehousing. Adam currently serves as the chairperson of the Washington DC Business Objects User Group.

See more by this author


Comments

8/5/2013 2:09:06 AM
Balaji

Thanks for this nice access level article,if possible try to add application specific access rights and more rights related in your next part.

we can able to contact this author(Adam Getz)?,no email id provided

Please log in to post a comment.

To learn more about subscription access to premium content, click here.