Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Creating Universes with SAP BusinessObjects

You're reading from  Creating Universes with SAP BusinessObjects

Product type Book
Published in Sep 2014
Publisher
ISBN-13 9781782170907
Pages 310 pages
Edition 1st Edition
Languages
Author (1):
Taha Mahmoud Taha Mahmoud
Profile icon Taha Mahmoud
Toc

Table of Contents (17) Chapters close

Creating Universes with SAP BusinessObjects
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
1. Introduction to BI and the Semantic Layer 2. Aligning BI Solutions with Business Demands 3. Creating Our First Universe 4. Creating the Data Foundation Layer 5. Creating the Business Layer 6. Testing Your Universe 7. The Data Foundation Layer – Advanced Topics 8. The Business Layer – Advanced Topics 9. Data Security and Profiles 10. A Multiuser Development Environment Index

Understanding the security model


Before we start talking about how to create security profiles or how to assign them, let's first try to understand what security profiles are and let's have an overview on the SAP BO IDT security model.

There are two main security models that can be adopted:

  • The first one is to allow everyone to see everything by default; you just apply restrictions or security rules to a set of specific users to restrict their access

  • The second model is to deny everyone access by default; you start giving access to a specific set of users on data that they are allowed to access

The first security model is the adopted one in the SAP BO Universe. This means that by default any user who has access to the Universe will be able to see all objects available in this Universe as well as data that can be generated from a query based on this Universe. To apply security mechanism, we will create a set of security rules or restrictions known as profiles and then we will assign them to a...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime