SAP Business Objects Security
SAP Business Objects Security
SAP Business Objects Security
Pal Alagarsamy
President Business Intelligence Practice GloWiz Inc
BOE XI 3.x Security 1
GloWiz Inc
GloWiz is an IT Staffing and Consulting company since 2005 We focus on Business Intelligence, Data Warehouse, Project Management and Architects Our BI Practice, particularly BOE includes;
BOE Environment Assessment Requirement Analysis Installation and Configuration (R2, XI 3.x) Dashboard Development Report Development System Administration and Support Security Setup and Management 5.x or 6.x or R2 to XI 3.x Migration BI Implementation & Best Practices BO Training
GloWiz Inc, 11801 Rockville Pike, Suite 403, Rockville MD 20852 2 P:BOE XI 3.x Security F: (877) 766-4240 Email: [email protected] Web: www.glowizinc.com (877) 456-9490
Agenda
1 2 3 4 5 6 7 Business Objects Security Overview Authentication and Authorization Primary Authentication and SSO Other BOE Security and Protections Central Management Console (CMC) Out of the Box Security Security Best Practices
Options
Windows AD with Kerberos only
Comments
Windows AD authentication to InfoView and CMC is available out of the box LDAP authentication to InfoView and CMC is available out of the box. SSO requires SiteMinder Enterprise authentication to InfoView and CMC is available out of the box. SSO requires Trusted Authentication
LDAP
Enterprise
Trusted Authentication
InfoView
SDK SDK
CMS
CMC is a web based tool helps you to perform day-to-day administrative tasks including user management, content management, and server management. Most of the authorization part is created, administered and maintained in CMC. This includes; Access Levels and Inheritance Application Security Content Objects Security
10
7. Applications Security
CMC allows you to control the appearance and features of tools such as, InfoView Desktop Intelligence Web Intelligence You can use user rights to control the user access of certain features in Business Objects applications.
12
14
Content level security is helpful to when users have different level of access across applications.
BOE XI 3.x Security 15
Application Security
Content Designer Web Intelligence CMC, etc.
16
17
Leverage out of the box access levels. Create new access level only when necessary.
Use common naming convention for your application across report folder, universe folder, user groups, and access levels.
Follow universe development best practices particularly connection, control, SQL generation, and restrictions.
18
Simplify the security model. Complex model may cause performance issue especially when SSO is implemented.
19
THANK YOU!
Pal Alagarsamy [email protected]