Security and Authorizations

[29 Matches Found]
Page 1 of 2         1 2      
Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Video icon
BI – 
In this demo video, Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create different security profiles.

Article icon
by Taha M. Mahmoud, Senior BI Consultant December 27, 2016
BI – 

Taha M. Mahmoud offers a comprehensive introduction to the enterprise security model in the SAP BusinessObjects BI platform. Learn about the main differences among the three different security levels in the SAP BusinessObjects BI platform 4.x: object-level, application-level, and Universe-level security. Find the right references to know more about each security level, and get two helpful security matrix templates to use for your own security implementation projects.


Article icon
by Rakesh Kalahasthi, Project Manager, PwC SDC, Bangalore, India March 8, 2016
SAP Professional Journal/BI – 

Rakesh Kalahasthi walks you through a step-by-step approach to overcome a limitation when you are developing geographical charts in SAP Lumira by pulling data from SAP Business Warehouse (SAP BW) powered by SAP HANA. SAP Lumira doesn’t allow you to create geographical charts by directly accessing SAP BW data models. This drawback can be addressed by importing optimized InfoCubes as native SAP HANA models and accessing them in SAP Lumira, which provides the ability to develop all types of geographical charts.


Article icon
by Ned Falk, Senior Education Consultant, SAP November 4, 2015
BI – 

Ned Falk gives an overview of the techniques used to build analytic privileges to control access to the data in information views (calculation, analytic, and attribute) in SAP HANA. He shows the options of using SQL privileges and XML-based analytical privileges, along with dynamic versions of both to accomplish row-level security. He also discusses the difference between both catalog (run-time) and repository (design-time) role creation of these privileges.


Article icon
by Adam Getz, Manager – Business Intelligence, CGI Federal May 15, 2015
BI – 

Adam Getz explains how to configure and set up delegated administration in BusinessObjects Enterprise 4.1 for groups, and how to limit the availability of users and groups within the Central Management Console (CMC) to a specific sub-administrator group.


Article icon
by Kehinde Eseyin, Security Architect, Turnkey Consulting Ltd. December 18, 2013
BI/Financials/SAP Professional Journal – 

Kehinde Eseyin explains how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.

 


Article icon
by Jennifer McKune, Senior Consultant, Decision First Technologies February 13, 2013
BI – 
Through written instruction and a video demo, discover best practices for creating a corporate reporting template and learn tips and tricks for rapid template development within SAP BusinessObjects Web Intelligence.

Quick tips icon
by Judith M. Myerson , Systems Engineer and Architect/Owner December 17, 2012
BI/Financials/HR/SAP Professional Journal/SCM – 
Here is list of CRM security terms that you will find useful in helping you understand the concept using backup and recovery in depth.

Article icon
by Manoj Kunta, Certified SAP NetWeaver Security Architect August 1, 2012
BI – 
See how to simplify the security setup for SAP BusinessObjects reports when a user is reporting from SAP NetWeaver BW or from a non-SAP system.

Article icon
by Adam Getz, Manager – Business Intelligence, CGI Federal June 8, 2012
BI – 

Take a tour of the basic security access levels offered in BusinessObjects, including overviews of how to manage these levels, how to assign advanced rights to users or groups, and how to use inheritance options to save time.


Quick tips icon
by Scott Wallask, Managing Editor December 16, 2011
BI – 

Take a balanced approach to BusinessObjects security access by considering methods to maintain security while keeping the day-to-day duties of users in mind.


Article icon
by Judith M. Myerson , Systems Engineer and Architect/Owner November 2, 2010
BI/Financials/HR/SAP Professional Journal/SCM – 
Find out how to identify assets, assess risks, mitigate residual risks, and implement backup and recovery options for Sybase Mobile Sales for SAP CRM.

Article icon
by YatKwai Kee, Lead Architect, Business Analytics/BI | Vasu Sattenapalli, Independent SAP BI Solution Architect August 13, 2010
BI – 
Design and populate information spaces for authorizations and use the personalization feature in SAP BusinessObjects Explorer to overcome the single authorization object limitation. In this example, the business scenario required authorization on two characteristics. This is not possible to do with standard authorization settings available in the SAP BusinessObjects Explorer index maintenance screen.

Article icon
by Judith M. Myerson , Systems Engineer and Architect/Owner May 17, 2010
BI/Financials/HR/SAP Professional Journal/SCM – 
Learn background information on cloud computing deployment models and see how to select a cloud service to meet your on-demand service requirements.

Article icon
by Judith M. Myerson , Systems Engineer and Architect/Owner April 15, 2010
BI/Financials/HR/SAP Professional Journal/SCM – 
Find out why multiple, in-depth layers of recovery parameters are more effective than a single layer when backing up and recovering SAP CRM data, business processes, and event logs.

Article icon
by Judith M. Myerson , Systems Engineer and Architect/Owner February 11, 2010
BI/Financials/HR/SAP Professional Journal/SCM – 
Learn how to defend SAP CRM applications on a smartphone or a handheld device (with BlackBerry Sales Client as a specific example), and see why multiple layers of defense are more effective than a single layer when you use the defense-in-depth model.

Article icon
by Anurag Barua, Independent SAP Advisor December 9, 2009
BI/SAP Professional Journal/Financials – 
While there is widespread recognition of the value that dashboards generate, there is also an incipient apprehension that they are not secure. Walk through some ways you can validate the security in dashboards using Xcelsius as an example, while maintaining the user-friendliness that is expected in a dashboard.

Article icon
by Jonathan D Griffith, SAP NetWeaver BW Subject Matter Expert and BI Solutions Center Tools Team Lead, FirstEnergy Corp. October 28, 2009
BI/SAP Professional Journal/Financials – 
Learn about an alternative method for creating and maintaining complex business access segregation rules that does not involve having your employees manually assign and revoke SAP NetWeaver BW roles with every employee job transfer. Through the use of analysis authorizations and security data models, you can update your SAP NetWeaver BW security automatically to reflect the latest changes to users as well as business rules governing data access.

Article icon
by Uday Gupta, Business Intelligence Lead, J. Crew January 1, 2009
BI – 

Follow these four steps to ensure only authorized users have access to sensitive data and administrators have the access they need to BPC.


Page 1 of 2         1 2