SAP BI 7 Security (PDF)




File information


Title: Slide 1
Author: Ravi Dindur

This PDF 1.5 document has been generated by Soda PDF Server, and has been sent on pdf-archive.com on 19/07/2017 at 13:49, from IP address 204.136.x.x. The current document download page has been viewed 805 times.
File size: 958.86 KB (61 pages).
Privacy: public file
















File preview


SAP BI 7.X Security Concepts

Presented By: Ravi G Dindur

Topics Covered:












BW/ BI Security introduction
Difference between BW 3.x and BI 7.x
Types of Authorization objects in BI.x
Securing reporting users access
Authorization Trace
Creation of Analysis Authorization
Assignment of Analysis Authorization
Securing Access to Workbooks
Additional BI7 Security Features
New Authorization Objects

BW/ BI Security introduction

R/3 the Security is mainly focused on Transaction codes, Specific field values and activities done by
the users as the motive in R/3 is to get the daily work done as soon and as effective as possible.
Whereas in BW/BI, the security is focused on data itself as almost all the activities revolve around
the data. Specifically the BW/BI Security is focused on Info Areas, Info Providers (Info Cubes, ODS
objects) and Queries. SAP BW/BI is focused on what data a user needs to access. This may be
controlled at the info object level or at the Info Provider level.
In R/3 the authorization object S_TCODE plays a vital role as it acts as a first level of defense. But in
BI as the number of Transaction codes is very few the authorization object S_TCODE has very little
role to play in BW security.
The basic difference between R/3 and BW security is that R/3 is focused on updating the business
data whereas BW is focused on displaying and analyzing the data.

Difference between BW 3.x and BI Security

SAP BW 3.5 and BW
7.0 without security
conversion

BW 7.0 and 7.3 with
security conversion

Technical
Foundation
Maintenance
Number of
InfoObjects
Navigational
attributes
Hierarchy
authorization

Authorization Objects

Composition of
Authorizations

Only intersection of
authorization objects are
permitted
Per InfoCube and
Per InfoObject only
InfoObject

Authorization
Relevance

Analysis authorizations

Not changeable
Changeable
10 fields at 10 characters Unlimited
On global basis

Individually

Via GUID 0TCTAUTHH

Equivalent to value
authorizations
Union ('as expected')

Contd…

RSSM

Old transaction: RSSM
Concept of authorization: 'Reporting
Authorization'

RSECADMIN
New transaction : RSECADMIN
Concept of authorization: 'Analysis
Authorization'

Contd…

Authorization:
PFCG (Role based approach)

Authorization:
PFCG (Role based approach)
RSECAUTH (Analysis Authorization Based
Approach)

Contd…

0BI_ALL: Allow full authorization for the IO
authorization relevant,

Full Authorization:
SAP_ALL, SAP_NEW

Used in the authorization object: S_RS_AUTH

Full Authorization:
SAP_ALL, SAP_NEW

Types of Authorization objects in BI

Standard Authorization Objects
• Administrative Authorization Objects
• Reporting Authorization Objects
Based on standard role and authorization concept of SAP
Analysis Authorization Objects
For Granular Security
• New security concept as of SAP NetWeaver 2004s
• Is not based on standard authorization concept in order to overcome the limitations

Standard Authorization Objects

• Can be used to protect the access to both Reporting as well as Administrative users
• However the granular security to reporting users cannot be achieved through Standard
Authorization Objects
• Examples for Standard Authorization Objects
Authorization Objects for Administration
S_RS_ADMWB
S_RS_IOBJ
S_RS_ISET
S_RS_ISOUR
Authorization Objects for Reporting
S_RS_COMP
S_RS_COMP1






Download SAP BI 7 Security



SAP BI 7 Security.pdf (PDF, 958.86 KB)


Download PDF







Share this file on social networks



     





Link to this page



Permanent link

Use the permanent link to the download page to share your document on Facebook, Twitter, LinkedIn, or directly with a contact by e-Mail, Messenger, Whatsapp, Line..




Short link

Use the short link to share your document on Twitter or by text message (SMS)




HTML Code

Copy the following HTML code to share your document on a Website or Blog




QR Code to this page


QR Code link to PDF file SAP BI 7 Security.pdf






This file has been shared publicly by a user of PDF Archive.
Document ID: 0000626403.
Report illicit content