PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact



SAP BI 7 Security .pdf



Original filename: SAP BI 7 Security.pdf
Title: Slide 1
Author: Ravi Dindur

This PDF 1.5 document has been generated by Soda PDF Server, and has been sent on pdf-archive.com on 19/07/2017 at 13:49, from IP address 204.136.x.x. The current document download page has been viewed 337 times.
File size: 936 KB (61 pages).
Privacy: public file




Download original PDF file









Document preview


SAP BI 7.X Security Concepts

Presented By: Ravi G Dindur

Topics Covered:












BW/ BI Security introduction
Difference between BW 3.x and BI 7.x
Types of Authorization objects in BI.x
Securing reporting users access
Authorization Trace
Creation of Analysis Authorization
Assignment of Analysis Authorization
Securing Access to Workbooks
Additional BI7 Security Features
New Authorization Objects

BW/ BI Security introduction

R/3 the Security is mainly focused on Transaction codes, Specific field values and activities done by
the users as the motive in R/3 is to get the daily work done as soon and as effective as possible.
Whereas in BW/BI, the security is focused on data itself as almost all the activities revolve around
the data. Specifically the BW/BI Security is focused on Info Areas, Info Providers (Info Cubes, ODS
objects) and Queries. SAP BW/BI is focused on what data a user needs to access. This may be
controlled at the info object level or at the Info Provider level.
In R/3 the authorization object S_TCODE plays a vital role as it acts as a first level of defense. But in
BI as the number of Transaction codes is very few the authorization object S_TCODE has very little
role to play in BW security.
The basic difference between R/3 and BW security is that R/3 is focused on updating the business
data whereas BW is focused on displaying and analyzing the data.

Difference between BW 3.x and BI Security

SAP BW 3.5 and BW
7.0 without security
conversion

BW 7.0 and 7.3 with
security conversion

Technical
Foundation
Maintenance
Number of
InfoObjects
Navigational
attributes
Hierarchy
authorization

Authorization Objects

Composition of
Authorizations

Only intersection of
authorization objects are
permitted
Per InfoCube and
Per InfoObject only
InfoObject

Authorization
Relevance

Analysis authorizations

Not changeable
Changeable
10 fields at 10 characters Unlimited
On global basis

Individually

Via GUID 0TCTAUTHH

Equivalent to value
authorizations
Union ('as expected')

Contd…

RSSM

Old transaction: RSSM
Concept of authorization: 'Reporting
Authorization'

RSECADMIN
New transaction : RSECADMIN
Concept of authorization: 'Analysis
Authorization'

Contd…

Authorization:
PFCG (Role based approach)

Authorization:
PFCG (Role based approach)
RSECAUTH (Analysis Authorization Based
Approach)

Contd…

0BI_ALL: Allow full authorization for the IO
authorization relevant,

Full Authorization:
SAP_ALL, SAP_NEW

Used in the authorization object: S_RS_AUTH

Full Authorization:
SAP_ALL, SAP_NEW

Types of Authorization objects in BI

Standard Authorization Objects
• Administrative Authorization Objects
• Reporting Authorization Objects
Based on standard role and authorization concept of SAP
Analysis Authorization Objects
For Granular Security
• New security concept as of SAP NetWeaver 2004s
• Is not based on standard authorization concept in order to overcome the limitations

Standard Authorization Objects

• Can be used to protect the access to both Reporting as well as Administrative users
• However the granular security to reporting users cannot be achieved through Standard
Authorization Objects
• Examples for Standard Authorization Objects
Authorization Objects for Administration
S_RS_ADMWB
S_RS_IOBJ
S_RS_ISET
S_RS_ISOUR
Authorization Objects for Reporting
S_RS_COMP
S_RS_COMP1


Related documents


PDF Document sap bi 7 security
PDF Document bi security
PDF Document p23 pma seclang
PDF Document zero to monero first edition v0 17
PDF Document team6 gtg spaceflight report finaldraft
PDF Document actions for turning on analysis authorizations concept


Related keywords