28 Oct 2014
2 MINS READ
Security is very important in the day-to-day life. Industries like Banking, capital market, etc., can’t be live without Security. Business requirement to secure all the critical data based on the user’s role in the Organization. In the traditional way, the Security implementation rules and userid’s were maintained in a security table and applied in the various reporting tools. The latest version of SAP Business objects was come up the new approach and it leverages the easy implementation of the security at the various levels like column, row and level. In this blog, we would be reading about difference in traditional way and new approach of Business Objects.
The Row-level Security is the force restrictions into WHERE Clause of the inferred SQL. The Traditional way of implementing Row level security by creating a Security table having all user id‘s and their appropriate access as columns, now join this security table with fact table based on a common dimension or a common key between both the tables and this should be a mandatory join. A filter will be created with value @variable(“BOUSER”) and this filter should be applied on the universe (check the use filter as mandatory in query option) meaning when using any of the objects from this universe, this filter will be applied automatically. Since we are using this filter in the report and since there is a direct join between security table and fact table, user gets to see only his or her data.
Same filter condition will be applied into WHERE clause of the inferred SQL but there is no security table for maintaining user ids and their Security rules. The User ids and access levels will be stored in the separate data profile in the same universe itself. The Filter condition will be applied automatically based on the data profile which created for users or user groups
In my next blog, we will see more about data profiling in Business Objects 4.0.
BI & Analytics
13 Nov 2020
07 Sep 2020
11 Jun 2020
28 May 2020
08 May 2020
24 Apr 2020
13 Apr 2020
06 Apr 2020
31 Mar 2020
26 Mar 2020
23 Jun 2017
06 Aug 2015
13 Jul 2015
17 Apr 2014
24 Mar 2014
22 Jan 2014
20 Dec 2013
01 Nov 2013
26 Sep 2013
03 Sep 2013
26 Aug 2013
29 Apr 2013
04 Mar 2013
21 Feb 2013
04 Feb 2013
03 Jan 2013
26 Nov 2010
19 Mar 2009
Digital Assurance
02 Jan 2012
17 Feb 2012
Infrastructure Mgmt. Services
02 Mar 2012
06 Feb 2013
Digital Assurance, Enterprise Solutions
14 Feb 2013
18 Feb 2013
27 Feb 2013
Others
01 Mar 2013
Enterprise Solutions
05 Mar 2013
18 Mar 2013
Digital Assurance, Enterprise Solutions, Others
22 Mar 2013
12 Apr 2013
26 Apr 2013
13 May 2013
11 Jun 2013
17 Jun 2013
25 Jun 2013
19 Aug 2013
27 Aug 2013
10 Sep 2013
19 Sep 2013
24 Sep 2013
30 Sep 2013
01 Oct 2013
03 Oct 2013
19 Nov 2013
Enterprise Solutions, Manufacturing and Consumer
28 Nov 2013
03 Dec 2013
03 Jan 2014
27 Jan 2014
31 Jan 2014
12 Feb 2014
13 Feb 2014
20 Mar 2014
11 Jun 2014
Manufacturing and Consumer
26 Jun 2014
30 Jun 2014
10 Jul 2014
15 Jul 2014
16 Jul 2014
18 Jul 2014
26 Aug 2015
28 Sep 2015
07 Oct 2015
26 Oct 2015
07 Mar 2016
22 Mar 2016
13 May 2016
23 May 2016
Application Transformation Mgmt.
11 Jul 2016
25 Aug 2016
03 Sep 2016
14 Sep 2016
15 Nov 2016
22 Nov 2016
25 Nov 2016
Business Process Services
25 Apr 2017
Banking and Financial Services
18 May 2017
30 May 2017
27 Jun 2017
18 Jul 2017
26 Oct 2017
Healthcare, Insurance
28 Nov 2017
11 Dec 2017
25 Jan 2018
21 Feb 2018
14 Mar 2018
( Mandatory field * )
The information you provide will be used in accordance with our terms ofPrivacy Policy
Please Check on "I Agree" to register for the blog.