Summary

Security is implemented both in the CMC and through the IDT Security Editor. They allow for quite granular security. In planning your implementation, first understand what is possible, and then begin developing a security approach that fits your company security philosophy. Remember the following:

• Leverage external authentication and single sign-on when possible.

• Use groups and folders to simplify security administration.

• With access-level security, the most restrictive rights apply when the rights are inherited through group membership. Thus, if a user is granted view access in one folder through a group assignment and then denied the right to view an object (different from No Access, which translates to Not Specified) via a different ...

Get SAP BusinessObjects BI 4.0 The Complete Reference 3/E now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.