BI Security
BI Security
Agenda
Trouble Shooting
Security – Why & What
What is Security?
3
Overview of SAP BI
Integrating all the data coming from various source systems and providing the data
access based on the user’s role is one of the major concerns of all the BI Projects.
4
Overview of SAP BI
5
Overview of SAP BI
6
OLTP
7
OLAP
The security function in BI does not put focus on transaction codes or activities, Instead
it focuses on data only. The security function in BI focuses on:
• InfoAreas
• Queries
8
Difference between R/3 Security & BI:
Here will use authorization objects, Fields and Here will use Info objects, info providers and
values to restrict the Tcode. multi providers etc to restrict the Report.
Here will use the Org Elements to restrict the Here will use the Characteristic values to
user at Company code, plant etc. restrict the user while executing the report.
Here End users will create and modify the Here End users are able to analyze the data.
master data.
By using SAP GUI only End users can able to By using BEX(RRMX) or Browser(RSRT) or Portal
login to the system. level only End users can be able to login to the
system.
9
Business Explorer
The Business Explorer (BEx) is the tool for Reporting in the Business Information
Warehouse. We work with the Business Explorer when we define queries,
analyze InfoCube data by navigating through queries, or save queries in
workbooks
10
SAP BW 3.x Security Concepts
Many Limitations e.g. limitations on the number of fields, can be attached to the
role only
11
SAP BW Authorization Concept
12
Authorization Object & Classes
13
Different Activity types
Activity Text
01 Create or Generate
02 Change
03 Display
04 Print, edit Messages
05 Lock
06 Delete
07 Activate
08 Display Change Documents
16 Execute
21 Transport
23 Maintain
60 Import
61 Export
14
S_RS_COMP
15
S_RS_COMP1
Authorization RSZOWNER = “$USER” provides users with access to activities in all the
components for which they are an owner.
16
S_RS_FOLD
17
S_RS_HIER
S_RS_ICUBE
S_RS_ICUBE Administrator Workbench - InfoCube
Using this authorization object you can restrict working with InfoCubes or their sub-objects.
To display data, transaction ‘LISTCUBE’ can be used as well!
S_RS_ISRCM
18
S_RS_ODSO
S_RFC
Authorization Check for RFC Access Field Name Heading
RFC_TYPE Type of RFC object
to be protected
RFC_NAME Name of RFC to be
protected
ACTVT Activity
19
Few other imp Objects
S_USER_TCD
Authorizations: Transactions in Roles Field Name Heading
TCD Transaction Code
20
BW 3.x Security Design
In “Business Explorer”
tab mark the tick on
field “Authorization
Relevant”
21
Important Tcode (RSSM)
22
BW 3.x Security Design (Create Auth. Obj.)
23
Create an Authorization Object for
Reporting
24
Important Tcode (RSA1)
25
Important Tcode (RSD1)
26
Important Tcode (RSD1) – Auth relevancy
27
Important Tcode (RSD1) – Navigational
Attribute
28
Important T-Code (RSRT)
29
Important Tcode RRMX
Analyzer Toolbar
Results
30
Overview of BI 7.x
BI 7.0 Security Concepts
Unlike reporting authorization, you need to select and restrict all authorization
relevant characteristics for the info provider while creating authorization
object
32
BI 7.0 Security Concepts
In Addition…
Auditing is easy with for the change documents
All the authorizations and assignments of user will be recorded with the
following virtual info providers.
– 0TCA_VAL: Change documents for value authorizations
– 0TCA_VAL: Change documents for hierarchy authorizations
– 0TCA_UA : Change documents for user authorization assignments
33
Analysis Authorization
With a special authorization object for role connection, S_RS_AUTH, the new
analysis authorizations can be assigned using role maintenance.
34
BI 7.0 Security Concepts
35
BI 7.0 Security Concepts
37
Tcode RSECADMIN
38
Tcode RSECADMIN
Possible values:-
EQ :Single value
BT: range of values
CP: Contains simple
patterns ending
with*(e.g XY*)
39
Special Authorization value
#(Hash)
Stands for the initial or unassigned value
+(Plus)
Denotes exactly one character
Used at the end of the value to specify a simple patter (e.g. RED+)
Used to specify date patterns (only for validity (OTCAVALID))
40
Special Authorization value Cont…
: (colon)
Allow access to only aggregate data
Sales organization *
Authorization 1
Sales employee :
41
Special Authorization characteristics
Authorization on Special Characteristics
1) Infoprovider
2) Validity
3) Activity
42
Full Access in Analysis Authorization
0BI_ALL
Like SAP_ALL
Gets regenerated each time a info object is made auth relevant
Has * for all characteristics
43
Assigning AA to a User
44
Some important Tables
It will shows the relation between Analysis auth and corresponding info objects
with field values
45
Some important Tables
46
Some important Tables
It will shows the information about maintains of AA. Eg. Shows the user details like who changed
AA and time stamp etc….
47
Some important Tables
48
Difference between BW 3.x & BI 7.x
Technical Foundation
SAP BW 3.x
SAP BI 7.x
50
Maintenance
SAP BW 3.x
Once a reporting authorization object is saved and used it can not be changed
anymore (for example, it's not possible to add new fields)
Changes to authorizations require a new log-on to become effective
SAP BI 7.x
Authorizations are changeable at all times (fields can be added and removed any
time)
Changes to authorizations can be done on the fly and become effective
immediately with saving
51
Number of InfoObjects
SAP BW 3.x
SAP BW 7.x
52
Validity of Authorizations
SAP BW 3.x
SAP BW 7.x
53
Authorizations for InfoProviders and
Hierarchies
SAP BW 3.x
SAP BI 7.x
54
Different Type of Users
End Users- They are the biggest part of users present in any BI system
Power Users- They are the one who assist these End users whenever it is required by
them, they also work as coordinator between End users and Administrators
Administrators- They form very important part of the system as they create all the
queries, info providers for user to work upon
55
Matrix
56
Analyzing Analysis Authorization issues: