Authorizations

[18 Matches Found]
 
Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys November 25, 2015
SAP Professional Journal/BI – 

Nitin Aggarwal and Sanjeev Kotwal show the various options available to customize SAP Access Control to provide automated provisioning of dynamic analysis authorization values in SAP Business Warehouse (SAP BW) systems.


Article icon
BI – 

Ned Falk shows how you can create personalized scheduled Web Intelligence documents with SAP BW and BusinessObjects to elevate performance issues and provide reports tailored to each user.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. December 18, 2013
BI/Financials/SAP Professional Journal – 

Kehinde Eseyin explains how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.

 


Article icon
by Adam Getz, Manager – Business Intelligence, CGI Federal December 20, 2012
BI – 

Sort out the authentication options offered for SAP BusinessObjects Enterprise and see how to use them.


Article icon
by Adam Getz, Manager – Business Intelligence, CGI Federal June 8, 2012
BI – 

Take a tour of the basic security access levels offered in BusinessObjects, including overviews of how to manage these levels, how to assign advanced rights to users or groups, and how to use inheritance options to save time.


Quick tips icon
by Scott Wallask, Managing Editor December 16, 2011
BI – 

Take a balanced approach to BusinessObjects security access by considering methods to maintain security while keeping the day-to-day duties of users in mind.


Article icon
by YatKwai Kee, Lead Architect, Business Analytics/BI | Vasu Sattenapalli, Independent SAP BI Solution Architect August 13, 2010
BI – 
Design and populate information spaces for authorizations and use the personalization feature in SAP BusinessObjects Explorer to overcome the single authorization object limitation. In this example, the business scenario required authorization on two characteristics. This is not possible to do with standard authorization settings available in the SAP BusinessObjects Explorer index maintenance screen.

Article icon
by Ryan Leask, Senior Director, Solution Strategy for SAP’s Business User and Line of Business Sales Organization | Prakash Darji, Vice President and General Manager, Data Warehousing Solutions and SAP HANA Platform, SAP December 11, 2009
BI – 

Get an in-depth look at how authentication and authorization are set up to ensure users can only work with data they own.


Article icon
by Jonathan D Griffith, SAP NetWeaver BW Subject Matter Expert and BI Solutions Center Tools Team Lead, FirstEnergy Corp. October 28, 2009
BI/SAP Professional Journal/Financials – 
Learn about an alternative method for creating and maintaining complex business access segregation rules that does not involve having your employees manually assign and revoke SAP NetWeaver BW roles with every employee job transfer. Through the use of analysis authorizations and security data models, you can update your SAP NetWeaver BW security automatically to reflect the latest changes to users as well as business rules governing data access.

Article icon
by Catherine Roze, Senior BW Consultant | Vitaliy Rudnytskiy, Senior BW Consultant, HP Enterprise Services March 20, 2009
BI/SAP Professional Journal – 
Find out how to approach the initial phases of an SAP NetWeaver BW Accelerator implementation, including project preparation, blueprint, and realization.

Article icon
by Uday Gupta, Business Intelligence Lead, J. Crew January 1, 2009
BI – 

Follow these four steps to ensure only authorized users have access to sensitive data and administrators have the access they need to BPC.


Article icon
by Marc Bernard, Chief Architect, NetWeaver RIG, SAP Labs | Shahid Manzur, BI Architect, SAP Labs July 1, 2008
BI – 
In SAP NetWeaver BI 7.0, you can join multiple authorizations. However, the union is only possible at an aggregated level. Find out how to implement analysis authorizations for unions and see a custom solution that helps overcome this limitation.

Article icon
by Ned Falk, Senior Education Consultant, SAP June 1, 2007
BI – 
A new transaction in SAP NetWeaver 2004s eases the task of creating and optionally assigning reporting authorizations to users. Get expert advice about using transaction RSECADMIN.

Article icon
by Robert Williams, Business Intelligence Project Manager May 1, 2006
BI – 
Avoid unexpected report results when you use hierarchy authorizations by taking these simple steps.

Article icon
by Graeme Smith, Principal BW Consultant, Unilog Ltd. September 1, 2005
BI – 
Securing information within an SAP BW system is necessary, but it can be difficult because of the massive volumes of sensitive data that are stored in the system. Learn how to develop authorization restrictions for InfoObjects via transaction RSSM so end users can access only relevant data.

Article icon
by Raju Veludandi, BW Practice Director, Compugra Systems, Inc. July 1, 2004
BI – 
Read about authorization objects, transaction code components, and the relationship between them.

Article icon
by Catherine Roze, Senior BW Consultant March 1, 2004
BI – 
Find out the key issues, policies, and best practices that you should follow to allow power users to effectively develop BW queries.