SAP BusinessObjects Planning and Consolidation: How to Effectively Secure Dimensions within a Hierarchy

  • by Madhavi Lokireddy, Senior SAP Security Consultant, Capgemini
  • March 23, 2010
Member access profiles in SAP BusinessObjects Planning and Consolidation are a fairly straightforward concept, but it can get tricky when you are assigning read, write, or denied access to individual members in a node and a parent within a hierarchy. Discover some tips to keep in mind while securing hierarchical dimensions.
Key Concept
Member access profiles in SAP BusinessObjects Planning and Consolidation determine the level of access a user has within the application. Member access profiles restrict access to a given application, dimension, and member. If the members of the dimension are arranged in a hierarchical order, the member access privileges flow down the hierarchy, from parent to child. Special attention needs to be given while allowing different permissions to the members at different hierarchy levels. Whenever there is a conflict in multiple access profiles, the less restrictive access always takes precedence.

SAP BusinessObjects Planning and Consolidation drives consistency, transparency, and reliability in financial planning, management consolidation, business reporting, and operational activities. To use it optimally, it is important to set up a proper security model that allows users the access they need without the ability to access unnecessary data.

I’ll walk you through four security scenarios that show different levels of security within the dimension members when arranged in a hierarchy. First I’ll show you the important components of security in SAP BusinessObjects Planning and Consolidation.

Components of the SAP BusinessObjects Planning and Consolidation Security Model

The four components that are tightly integrated and make up the security model are:

Madhavi Lokireddy

Madhavi Lokireddy is an SAP security lead at Capgemini hosting services. She leads the security COE practice and manages security delivery for multiple clients. Madhavi has played various roles involving design, audit, remediation, and redesign of security. She has extensive security experience in areas such as SAP ECC, SAP ERP HCM, SAP NetWeaver BW, SAP BusinessObjects GRC solutions, and SAP BusinessObjects Planning and Consolidation.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.