Security Access Concerns for BusinessObjects Administrators to Tackle

  • by Scott Wallask, Managing Editor
  • December 16, 2011

Take a balanced approach to SAP BusinessObjects security access by considering methods to maintain security while keeping the day-to-day duties of users in mind.

Even if it’s not in the forefront of an SAP BusinessObjects administrator’s day-to-day duties, access to information is probably always an underlying concern.

From a BusinessObjects perspective, a security breach is an unlikely occurrence; instead, questions more likely arise about who has access to data and whether they should have expanded authorizations, said Dallas Marks, principal architect and trainer at Kalvin Consulting.

“There is no big, red button in BusinessObjects that says, ‘Tell me what every user has access to,’ ” said Marks, who also independently blogs about BI topics.

However, through the BusinessObjects Central Management Console (CMC), an administrator or help desk member can use the security query and permissions explorer features to learn:

  • What rights a particular user has
  • A specific report or universe to infer why someone does or doesn’t have access

Scott Wallask

Scott Wallask was the managing editor for the BI, BusinessObjects, and HANA content of SAPexperts. He has covered SAP for WIS since May 2010, with a focus on SAP NetWeaver BW, HANA, BusinessObjects, customer relationship management, supply chain management, and human resources. He has spent 19 years as a writer and editor, including stints as a reporter at several newspapers in the Boston area. For 12 years starting in 1998, he created in-depth content about fire safety and OSHA regulations in hospitals while working at HCPro, a healthcare publishing company. In 2005, he won a first place award for best instructional reporting from the Specialized Information Publishers Association for his series on fire protection efforts in nursing homes. He graduated magna cum laude from Northeastern University in 1994 with a BA degree in print journalism.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.