BI 7.0 Reporting Authorization Based on Characteristic Value Level
SAP COMMUNITY NETWORK SDN -
- boc.sap.com |
- uac.sap.com © 2011 SAP AG 3
SAP BI Authorization/security is an integral part of any BI implementation. Integrating all the data coming
from various source systems and providing the data access based on the user‟s role is one of the important
part of all the BI Projects.Security of SAP R/3-ECC systems are based on the activities e.g. transaction level, particular activity leveletc. while SAP BI Authorization/security is focused on what data user can access.Authorization in BI is categorized by major 2 categories:
The way we maintain security for administrative users is same as SAP R/3-ECCsecurity but we have additional authorization objects in system which are defined only for BI objects.
Analysis Authorization using transaction
, to maintain authorizations forreporting users.
There are 5 company codes and we are going to restrict BI reporting user (USER1) to access data of only 2company codes out of 5. And Company code is also not a part of user input selection parameter in report. Inthis eg.1000 and 2000 are the Company codes of the user USER1 for which we are going to give access. Sowhenever the user USER1 executes the report, he will only be able to see the data relevant to Companycodes 1000 and 2000 in the report.
- To maintain info object authorization relevant.
To maintain roles.
To maintain analysis authorization and role assignment to user.
Info Object Maintenance for Authorization
Use RSD1 transaction to maintain infoobject. Mark the Infoobject
and activate it. Inthis case Infoobject company code is used and authorization relevant field is checked.