SAP BusinessObjects BI Security
SAP Press (Verlag)
978-1-59229-437-4 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
SAP NetWeaver BW, LDAP, and Active Directory authentication
Single sign-on
Rights framework and inheritance model
Access levels
General and specific rights
Secured connections
Universe security
Access restriction
Data and business security profile
Scheduling, publications, and personalization profile
Christian Ah-Soon has worked for SAP BusinessObjects for 13 years as a program manager on areas like administration, security, internationalization, and installation. Christian holds a Ph.D. in computer science and graduated from TELECOM Nancy. David François Gonzalez is an SAP BusinessObjects product expert engineer with the research and development group based in France. David has worked for SAP BusinessObjects for 13 years, starting with the BusinessObjects V5 and the Supervisor product and later managing a team in charge of BusinessObjects V6 suite testing. David shifted to customer contact with XI R2 and XI 3.1, where he was in charge of customer environment replication. Four years ago, he started working very close to both the field and the customers, providing best practices and white papers on internal and external websites. Since then, he has participated in conferences such as Utilisateurs SAP Francophones and TechEd, and he regularly helps customers troubleshoot site problems and implement SAP BusinessObjects solutions.
Acknowledgments
Introduction to Security in SAP BusinessObjects Business Intelligence 4.0
Business Intelligence Overview
System Security Considerations
A Brief History of Business Objects
SAP Business Objects Business Intelligence 4.0 Review
Book Roadmap
Administration and Security
BI 4.0 Deployment
BI 4.0 Installation
Administration Tools
CMS Repository and File Repository Server
Cryptography
BI 4.0 Servers
Auditing
Summary
Users and Authentication
User Authentication
Enterprise Users and Groups
Managing Users and Groups in the CMC
Trusted Authentication
Aliases and External Authentications
Managing Aliases in the CMC
Managing LDAP Authentication in the CMC
Managing Active Directory Authentication
Summary
Rights Framework
Assigned Rights
General and Specific Rights
Inheritance
Non-Owner and Owner Versions of Rights
Objects General Rights
Application General Rights
Managing Rights in the CMC
Access Levels
Managing Access Level in the CMC
Running Administration Queries in the CMC
Summary
Applications and Rights Reference
Applications List
System Objects List
Content Object List
Analysis, Edition for OLAP
BEx Web Applications
BI Launch Pad
Widgets
BI Workspaces
Central Management Console
SAP Crystal Reports
Explorer
Information Design Tool
Promotion Management
SAP Business Objects Mobile
SAP StreamWork
Universe Design Tool
Version Management
Visual Difference
Web Intelligence
Users and Groups
Connections
Note Rights
Schedule Output Format
Summary
Connections and Database Authentications
Secured Connections
Local Connections
Connection Authentication Mode
Using Credentials Mapping for Single Sign-On
Managing Connections
Summary
Universe Security in Universe Design Tool
Universe
Using Filters on Table, Object, Class, or Universe
Using Filters in Universe Design Tool
Access Restriction Definition
Access Restriction Aggregation
Managing Access Restrictions in Universe Design Tool
Object Access Level
Managing Object Access Levels
Summary
Universe Security in Information Design Tool
Introduction to New Universe
Defining WHERE Clauses and Filters in Information Design Tool
Security Profiles
Data Security Profiles
Business Security Profiles
Managing Security Profiles in Information Design Tool
Object Access Level
User Attributes
Managing User Attributes in the CMC
Running a Secured Query
Summary
Scheduling and Publishing
Scheduling and Publishing Framework
Scheduling
Publishing
Publication Recipients
Publication Personalization and Profile
Report Bursting Options
Summary
Security for SAP NetWeaver BW Data Sources
SAP Authentication
Configuring SAP Authentication
SAP Connections
Creating SAP NetWeaver BW Connections
SAP Authentication and Single Sign-On
SNC and STS
Configuring STS
User Attributes
Summary
Defining and Implementing a Security Model
General Recommendations
Defining Users and Groups
Defining Folders and Objects
Defining Rights
Defining Access Levels
Mandatory Rights for Common Workflows
Setting Security for External Groups
Delegated Administration
Defining Database Filtering
Universe Security
Combined Authentication
Testing a Security Model
Summary
Appendices
Universe Comparison and Conversion
The Authors
Index
Erscheint lt. Verlag | 31.12.2012 |
---|---|
Reihe/Serie | SAP PRESS Englisch |
Verlagsort | Maryland |
Sprache | englisch |
Maße | 175 x 229 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Weitere Themen ► SAP | |
Schlagworte | • Application rights • • Architecture and security • • Connections and database authentication • • Objects rights • • Rights framework • • SAP data sources • • Universe security • • Users and authentication |
ISBN-10 | 1-59229-437-5 / 1592294375 |
ISBN-13 | 978-1-59229-437-4 / 9781592294374 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich