SAP BusinessObjects BI Security
(Sprache: Englisch)
How secure is your SAP BusinessObjects environment? Find out with this book, which will shore up your understanding of the basic concepts involved in securing data and teach you the practical, technical steps you'll need. Explore the frameworks,...
Leider schon ausverkauft
versandkostenfrei
Buch (Gebunden)
Fr. 119.90
inkl. MwSt.
- Kreditkarte, Paypal, Rechnungskauf
- 30 Tage Widerrufsrecht
Produktdetails
Produktinformationen zu „SAP BusinessObjects BI Security “
Klappentext zu „SAP BusinessObjects BI Security “
How secure is your SAP BusinessObjects environment? Find out with this book, which will shore up your understanding of the basic concepts involved in securing data and teach you the practical, technical steps you'll need. Explore the frameworks, properties, and data sources of the SAP BusinessObjects suite. Up to date for release 4.0 FP3 and applicable to earlier releases, this comprehensive guide is the key to locking down your system.
Highlights Include:SAP NetWeaver BW, LDAP, and Active Directory authentication
Single sign-on
Rights framework and inheritance model
Access levels
General and specific rights
Secured connections
Universe security
Access restriction
Data and business security profile
Scheduling, publications, and personalization profile
Inhaltsverzeichnis zu „SAP BusinessObjects BI Security “
Acknowledgments ... 21
1. Introduction to Security in SAP BusinessObjects Business Intelligence 4.0 ... 23
1.1 ... Business Intelligence Overview ... 23
1.2 ... System Security Considerations ... 24
1.3 ... A Brief History of Business Objects ... 26
1.4 ... SAP BusinessObjects Business Intelligence 4.0 Review ... 27
1.5 ... Book Roadmap ... 29
2. Administration and Security ... 33
2.1 ... BI 4.0 Deployment ... 34
2.2 ... BI 4.0 Installation ... 36
2.3 ... Administration Tools ... 44
2.4 ... CMS Repository and File Repository Server ... 47
2.5 ... Cryptography ... 53
2.6 ... BI 4.0 Servers ... 58
2.7 ... Auditing ... 62
2.8 ... Summary ... 65
3. Users and Authentication ... 67
3.1 ... User Authentication ... 68
3.2 ... Enterprise Users and Groups ... 73
3.3 ... Managing Users and Groups in the CMC ... 80
3.4 ... Trusted Authentication ... 94
3.5 ... Aliases and External Authentications ... 99
3.6 ... Managing Aliases in the CMC ... 106
3.7 ... Managing LDAP Authentication in the CMC ... 111
3.8 ... Managing Active Directory Authentication ... 121
3.9 ... Summary ... 142
4. Rights Framework ... 145
4.1 ... Assigned Rights ... 145
4.2 ... General and Specific Rights ... 146
4.3 ... Inheritance ... 148
4.4 ... Non-Owner and Owner Versions of Rights ... 155
4.5 ... Objects General Rights ... 157
4.6 ... Application General Rights ... 163
4.7 ... Managing Rights in the CMC ... 165
4.8 ... Access Levels ... 171
4.9 ... Managing Access Level in the CMC ... 175
4.10 ... Running Administration Queries in the CMC ... 181
4.11 ... Summary ... 185
5. Applications and Rights Reference ... 187
5.1 ... Applications List ... 188
5.2 ... System Objects List ... 194
5.3 ... Content Object List ... 196
5.4 ... Analysis, Edition for OLAP ... 199
5.5 ... BEx Web Applications ... 200
5.6 ... BI Launch Pad ... 200
5.7 ... Widgets ... 202
5.8 ... BI Workspaces ...
... mehr
203
5.9 ... Central Management Console ... 206
5.10 ... SAP Crystal Reports ... 207
5.11 ... Explorer ... 209
5.12 ... Information Design Tool ... 221
5.13 ... Promotion Management ... 228
5.14 ... SAP BusinessObjects Mobile ... 236
5.15 ... SAP StreamWork ... 237
5.16 ... Universe Design Tool ... 238
5.17 ... Version Management ... 244
5.18 ... Visual Difference ... 249
5.19 ... Web Intelligence ... 250
5.20 ... Users and Groups ... 277
5.21 ... Connections ... 279
5.22 ... Note Rights ... 283
5.23 ... Schedule Output Format ... 284
5.24 ... Summary ... 285
6. Connections and Database Authentications ... 287
6.1 ... Secured Connections ... 288
6.2 ... Local Connections ... 293
6.3 ... Connection Authentication Mode ... 295
6.4 ... Using Credentials Mapping for Single Sign-On ... 301
6.5 ... Managing Connections ... 303
6.6 ... Summary ... 314
7. Universe Security in Universe Design Tool ... 317
7.1 ... Universe ... 318
7.2 ... Using Filters on Table, Object, Class, or Universe ... 323
7.3 ... Using Filters in Universe Design Tool ... 325
7.4 ... Access Restriction Definition ... 330
7.5 ... Access Restriction Aggregation ... 337
7.6 ... Managing Access Restrictions in Universe Design Tool ... 339
7.7 ... Object Access Level ... 354
7.8 ... Managing Object Access Levels ... 355
7.9 ... Summary ... 359
8. Universe Security in Information Design Tool ... 361
8.1 ... Introduction to New Universe ... 362
8.2 ... Defining WHERE Clauses and Filters in Information Design Tool ... 366
8.3 ... Security Profiles ... 370
8.4 ... Data Security Profiles ... 375
8.5 ... Business Security Profiles ... 382
8.6 ... Managing Security Profiles in Information Design Tool ... 395
8.7 ... Object Access Level ... 431
8.8 ... User Attributes ... 434
8.9 ... Managing User Attributes in the CMC ... 436
8.10 ... Running a Secured Query ... 439
8.11 ... Summary ... 441
9. Scheduling and Publishing ... 443
9.1 ... Scheduling and Publishing Framework ... 444
9.2 ... Scheduling ... 445
9.3 ... Publishing ... 449
9.4 ... Publication Recipients ... 452
9.5 ... Publication Personalization and Profile ... 456
9.6 ... Report Bursting Options ... 463
9.7 ... Summary ... 466
10. Security for SAP NetWeaver BW Data Sources ... 467
10.1 ... SAP Authentication ... 468
10.2 ... Configuring SAP Authentication ... 475
10.3 ... SAP Connections ... 482
10.4 ... Creating SAP NetWeaver BW Connections ... 486
10.5 ... SAP Authentication and Single Sign-On ... 494
10.6 ... SNC and STS ... 495
10.7 ... Configuring STS ... 498
10.8 ... User Attributes ... 505
10.9 ... Summary ... 505
11. Defining and Implementing a Security Model ... 507
11.1 ... General Recommendations ... 507
11.2 ... Defining Users and Groups ... 509
11.3 ... Defining Folders and Objects ... 511
11.4 ... Defining Rights ... 512
11.5 ... Defining Access Levels ... 514
11.6 ... Mandatory Rights for Common Workflows ... 517
11.7 ... Setting Security for External Groups ... 521
11.8 ... Delegated Administration ... 522
11.9 ... Defining Database Filtering ... 525
11.10 ... Universe Security ... 527
11.11 ... Combined Authentication ... 531
11.12 ... Testing a Security Model ... 533
11.13 ... Summary ... 534
Appendices ... 535
A ... Universe Comparison and Conversion ... 535
B ... The Authors ... 551
Index ... 553
5.9 ... Central Management Console ... 206
5.10 ... SAP Crystal Reports ... 207
5.11 ... Explorer ... 209
5.12 ... Information Design Tool ... 221
5.13 ... Promotion Management ... 228
5.14 ... SAP BusinessObjects Mobile ... 236
5.15 ... SAP StreamWork ... 237
5.16 ... Universe Design Tool ... 238
5.17 ... Version Management ... 244
5.18 ... Visual Difference ... 249
5.19 ... Web Intelligence ... 250
5.20 ... Users and Groups ... 277
5.21 ... Connections ... 279
5.22 ... Note Rights ... 283
5.23 ... Schedule Output Format ... 284
5.24 ... Summary ... 285
6. Connections and Database Authentications ... 287
6.1 ... Secured Connections ... 288
6.2 ... Local Connections ... 293
6.3 ... Connection Authentication Mode ... 295
6.4 ... Using Credentials Mapping for Single Sign-On ... 301
6.5 ... Managing Connections ... 303
6.6 ... Summary ... 314
7. Universe Security in Universe Design Tool ... 317
7.1 ... Universe ... 318
7.2 ... Using Filters on Table, Object, Class, or Universe ... 323
7.3 ... Using Filters in Universe Design Tool ... 325
7.4 ... Access Restriction Definition ... 330
7.5 ... Access Restriction Aggregation ... 337
7.6 ... Managing Access Restrictions in Universe Design Tool ... 339
7.7 ... Object Access Level ... 354
7.8 ... Managing Object Access Levels ... 355
7.9 ... Summary ... 359
8. Universe Security in Information Design Tool ... 361
8.1 ... Introduction to New Universe ... 362
8.2 ... Defining WHERE Clauses and Filters in Information Design Tool ... 366
8.3 ... Security Profiles ... 370
8.4 ... Data Security Profiles ... 375
8.5 ... Business Security Profiles ... 382
8.6 ... Managing Security Profiles in Information Design Tool ... 395
8.7 ... Object Access Level ... 431
8.8 ... User Attributes ... 434
8.9 ... Managing User Attributes in the CMC ... 436
8.10 ... Running a Secured Query ... 439
8.11 ... Summary ... 441
9. Scheduling and Publishing ... 443
9.1 ... Scheduling and Publishing Framework ... 444
9.2 ... Scheduling ... 445
9.3 ... Publishing ... 449
9.4 ... Publication Recipients ... 452
9.5 ... Publication Personalization and Profile ... 456
9.6 ... Report Bursting Options ... 463
9.7 ... Summary ... 466
10. Security for SAP NetWeaver BW Data Sources ... 467
10.1 ... SAP Authentication ... 468
10.2 ... Configuring SAP Authentication ... 475
10.3 ... SAP Connections ... 482
10.4 ... Creating SAP NetWeaver BW Connections ... 486
10.5 ... SAP Authentication and Single Sign-On ... 494
10.6 ... SNC and STS ... 495
10.7 ... Configuring STS ... 498
10.8 ... User Attributes ... 505
10.9 ... Summary ... 505
11. Defining and Implementing a Security Model ... 507
11.1 ... General Recommendations ... 507
11.2 ... Defining Users and Groups ... 509
11.3 ... Defining Folders and Objects ... 511
11.4 ... Defining Rights ... 512
11.5 ... Defining Access Levels ... 514
11.6 ... Mandatory Rights for Common Workflows ... 517
11.7 ... Setting Security for External Groups ... 521
11.8 ... Delegated Administration ... 522
11.9 ... Defining Database Filtering ... 525
11.10 ... Universe Security ... 527
11.11 ... Combined Authentication ... 531
11.12 ... Testing a Security Model ... 533
11.13 ... Summary ... 534
Appendices ... 535
A ... Universe Comparison and Conversion ... 535
B ... The Authors ... 551
Index ... 553
... weniger
Autoren-Porträt von Christian Ah-Soon, David François Gonzalez
Ah-Soon, ChristianChristian Ah-Soon has worked for SAP BusinessObjects for 13 years as a program manager on areas like administration, security, internationalization, and installation. Christian holds a Ph.D. in computer science and graduated from TELECOM Nancy.Gonzalez, David François
David François Gonzalez is an SAP BusinessObjects product expert engineer with the research and development group based in France. David has worked for SAP BusinessObjects for 13 years, starting with the BusinessObjects V5 and the Supervisor product and later managing a team in charge of BusinessObjects V6 suite testing. David shifted to customer contact with XI R2 and XI 3.1, where he was in charge of customer environment replication. Four years ago, he started working very close to both the field and the customers, providing best practices and white papers on internal and external websites. Since then, he has participated in conferences such as Utilisateurs SAP Francophones and TechEd, and he regularly helps customers troubleshoot site problems and implement SAP BusinessObjects solutions.
Bibliographische Angaben
- Autoren: Christian Ah-Soon , David François Gonzalez
- 2013, 562 Seiten, mit Abbildungen, Masse: 18,7 x 23,7 cm, Gebunden, Englisch
- Verlag: SAP Press
- ISBN-10: 1592294375
- ISBN-13: 9781592294374
- Erscheinungsdatum: 28.12.2012
Sprache:
Englisch
Kommentar zu "SAP BusinessObjects BI Security"
0 Gebrauchte Artikel zu „SAP BusinessObjects BI Security“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "SAP BusinessObjects BI Security".
Kommentar verfassen