Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
BI SEC

BI SEC

Ratings: (0)|Views: 926|Likes:
Published by kkodavati_1

More info:

Published by: kkodavati_1 on Jul 07, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/12/2014

pdf

text

original

 
 
SAP COMMUNITY NETWORK SDN -
sdn.sap.com |
BPX -
bpx.sap.com |
BOC
- boc.sap.com |
UAC
- uac.sap.com © 2011 SAP AG 1
BI 7.0 Reporting AuthorizationBased on Characteristic ValueLevel
Applies to:
SAP Business Intelligence (BW) 7.0.For more details, visit the EDW homepage. 
Summary
This document will explain the steps to create Info object (characteristic value) level authorization for areporting user in SAP BI 7.0
Author:
Avinash Verma
Company:
L&T Infotech
Created on:
09 February 2011
Author Bio
Avinash Verma is a SAP BI Consultant currently working in Larsen & Toubro Infotech Ltd. He hasinvolved in implementation and development of various BI/BW projects.
 
BI 7.0 Reporting Authorization Based on Characteristic Value Level 
SAP COMMUNITY NETWORK SDN -
sdn.sap.com |
BPX -
bpx.sap.com |
BOC
- boc.sap.com |
UAC
- uac.sap.com © 2011 SAP AG 2
Table of Contents
 
BI 7.0 Reporting Authorization Based on Characteristic Value Level 
SAP COMMUNITY NETWORK SDN -
sdn.sap.com |
BPX -
bpx.sap.com |
BOC
- boc.sap.com |
UAC
- uac.sap.com © 2011 SAP AG 3
Introduction
SAP BI Authorization/security is an integral part of any BI implementation. Integrating all the data coming
from various source systems and providing the data access based on the user‟s role is one of the important
part of all the BI Projects.Security of SAP R/3-ECC systems are based on the activities e.g. transaction level, particular activity leveletc. while SAP BI Authorization/security is focused on what data user can access.Authorization in BI is categorized by major 2 categories:
Administrative Users
 
 –
The way we maintain security for administrative users is same as SAP R/3-ECCsecurity but we have additional authorization objects in system which are defined only for BI objects.
Reporting Users
 –
Analysis Authorization using transaction
RSECADMIN
, to maintain authorizations forreporting users.
Business Scenario
There are 5 company codes and we are going to restrict BI reporting user (USER1) to access data of only 2company codes out of 5. And Company code is also not a part of user input selection parameter in report. Inthis eg.1000 and 2000 are the Company codes of the user USER1 for which we are going to give access. Sowhenever the user USER1 executes the report, he will only be able to see the data relevant to Companycodes 1000 and 2000 in the report.
Transactions used
 
RSD1
- To maintain info object authorization relevant.
 
PFCG
 
 –
To maintain roles.
 
RSECADMIN
 
 –
To maintain analysis authorization and role assignment to user.
Info Object Maintenance for Authorization
Use RSD1 transaction to maintain infoobject. Mark the Infoobject
Authorization Relevant
and activate it. Inthis case Infoobject company code is used and authorization relevant field is checked.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->