Further Securing the Data: Column- and Row-Level Security
In this chapter, you first created users and addressed user authentication. Through the use of folders and groups, you then managed access to reports within the folders and, ultimately, the universe and connections to allow users to refresh the reports or create new ones. This is the last phase of authorization (as shown earlier in Figure 12-1). SAP BusinessObjects offers more granular security at both the column and row levels.
There are multiple ways to implement column-level security. The first approach requires setting security levels in the business layer and then granting those levels within the CMC. This approach has existed since the early versions of BusinessObjects, but it is ...
Get SAP BusinessObjects BI 4.0 The Complete Reference 3/E now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.