Professional Documents
Culture Documents
Implementing BI Security Properly With Tip and Tricks PDF
Implementing BI Security Properly With Tip and Tricks PDF
Tips throughout.
Impact on security
Real Experience. Real Advantage. 4
[ Introduction to BI Security - Continued
BI access is granted to users in a few different ways.
This presents us with options discussed later.
Options:
Standard Authorizations
Based on Role and Authorization concept as in ECC.
Administrators and Developers
Reporting Authorizations
Granted through Standard Authorizations
Limitations
Analysis Authorizations
As of Netweaver 2004
Allows reporting and analysis in BI
5
Real Experience. Real Advantage.
[ Tools for Administering BI Security
Transactions
RSD1
RSECADMIN
RSECAUTH
RSU01
RSUDO
PFCG
Tables (via SE16, SM30, etc)
RSEC*
InfoObjects must be
made authorization
relevant if they are to
be checked or used to
secure data.
Transaction
RSECADMIN is the
portal to other
transactions
RSU01
Analysis Authorizations
are the roles of BI.
Analysis authorizations
can
be secured on many
levels:
Infocube
Characteristic
Characteristic Value
Key Figure
Hierarchy Node
0TCAACTVT (Activity)
0TCAIPROV (InfoProvider)
0TCAVALID (Validity Period)
Drilling in to the
characteristic allows
the admin to provide
values.
3 Operators:
EQ
BT
CP
-Use CP if value is *
-Wildcards are allowed
-0SD*
BI User Maintenance
happens here
SU01
ECC User
Maintenance
Notice there is no
Create button.
Guesses?
Assignment of
Analysis
Authorizations takes
place here.
S_RS_*
Access to certain
tables can be very
useful to BI Admins.
Query
Query Selection
Authorizations
Selection
Authorizations