BW/BI Security. SAP Business Warehouse/Business Intelligence Reporting



Similar documents
BW/BI Concepts and Security

Business Intelligence

Business Intelligence Overview. BW/BI Security. BW/BI Architecture. Business Explorer (BEx) BW/BI BEx Tools Overview. What is BEx?

Business Explorer (BEx)

BEx Ad Hoc Query Fundamentals Part III

Business Intelligence. BI Security. BI Environment. Business Explorer (BEx) BI Environment Overview. Ad Hoc Query Considerations

Offline Mode SAP Mobile BI 4.1. Author : Priya Sridhar

SAP Certified Application Associate - Business Intelligence with SAP NetWeaver 7.0

Step by Step guide of Report-to- Report Interface in BW Reporting

How to create connections with SAP BusinessObjects BI 4.0

Understanding BEx Query Designer: Part-2 Structures, Selections and Formulas

A Practical Guide to SAP" NetWeaver Business Warehouse (BW) 7.0

Business Objects 4.1 Quick User Guide

Welcome to the new SAP Predictive Analytics 2.0!

SAP BUSINESS OBJECT ANALYSIS FOR EXCEL DEVELOPER GUIDE

Mitigation Planning Portal (MPP) Tutorial Canned Reports Updated 5/18/2015

Release Document Version: User Guide: SAP BusinessObjects Analysis, edition for Microsoft Office

A Few Cool Features in BW 7.4 on HANA that Make a Difference

Umoja Realisation Workshop Cluster 3

Query OLAP Cache Optimization in SAP BW

SAP HANA Live & SAP BW Data Integration A Case Study

Step by Step Procedure to Create Broadcasters, to Schedule and to Enhance of SAP- BI Queries from Query Designer

Center for Enterprise Resource Planning (ERP) How to get started

SAP Project Management Experience Prince 2, Scrum, RFI, RFO, RFP Data Management Performance Management, KPI, financial reporting,

Dynamic Authorization Concept and Role Assignment in BI

How I Transitioned from an E-Business Suite Development to an Oracle Business Intelligence Developer

Business Warehouse BEX Query Guidelines

Compounding in Infoobject and Analyzing the Infoobject in a Query

BW Financial solution: ACCOUNT PAYABLES (AP)

How to Request Access to the Commerce Contract Management System

1 TABLE OF CONTENTS Page 1

Reporting and Analysis with

Query 0BBP_INV_Q002 - Invoices per Vendor

How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options)

SLDS Project Update. Data Governance Group September 21, 2011

Questions and Answers: SAP BusinessObjects BI 4.0 and the Semantic Layer for SAP Netweaver BW

Understanding DSO (DataStore Object) Part 1: Standard DSO

Deploying Crystal Reports on Top of a SAP BI Query

Configuration and Utilization of the OLAP Cache to Improve the Query Response Time

Open Items Analytics Dashboard System Configuration

Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist

Rakesh Tej Kumar Kalahasthi and Benson Hilbert SAP BI Practice, Bangalore, India

SAP BW Configuration Basic System Settings

IMPLEMENTATION OF DATA WAREHOUSE SAP BW IN THE PRODUCTION COMPANY. Maria Kowal, Galina Setlak

QlikView's Value Proposition to SAP Accounts

Τhe SAS BI delivers business-critical answers ahead of the competition Yannis Salamaras Senior Business Intelligence Consultant SAS Greece & Cyprus

Ingo Hilgefort. Integrating SAP. Business Objects BI with SAP NetWeaver. Bonn Boston

Mastering the SAP Business Information Warehouse. Leveraging the Business Intelligence Capabilities of SAP NetWeaver. 2nd Edition

SAP BusinessObjects BI Content Lifecycle Management Best Practices

Ceridian Business Intelligence June 30, Setting Up Business Intelligence Users

Course duration: 45 Hrs Class duration: 1-1.5hrs

Secure Management Guide. June 2008

Data Warehouses and Business Intelligence ITP 487 (3 Units) Fall Objective

Business Information Warehouse. Reporting & Analysis

PUBLIC. How to Use in SAP Business One. Solutions from SAP. SAP Business One 2005 A SP01

Multi-Union Membership System

Business Objects BI Platform 4.x with SAP NetWeaver

RISKMASTER Business Intelligence Working with Reports User Guide

User Manual for the SAP Business Objects BI Platform 4.1 System (BI Suite) CONTENTS

IIT Cognos Financial Reporting Dashboard User Guide

An Overview of SAP BW Powered by HANA. Al Weedman

Welcome to the session Operational Analytics with ODP- Modeling Authorizations

Agility for your Business with BW Workspaces for SAP BI Introduction, Motivation and benefits for IT and Business

Using Business Intelligence to Achieve Sustainable Performance

Converting and Exporting Data in XML Format

Decision Support AITS University Administration. EDDIE 4.1 User Guide

SA S P A BO B BJ B COURSE CONTENT 2015

Norbert Egger, Jean-Marie R. Fiechter, Jens Rohlf, Jörg Rose, Oliver Schrüffer. SAP BW Reporting and Analysis

Components of SAP BusinessObjects 4.0 An Overview. Adam Getz Practice Manager, Business Intelligence DCS Consulting, Inc.

Agenda. SAP BusinessObjects 2012 / Slide 2 Private and Confidential

9.1 SAS/ACCESS. Interface to SAP BW. User s Guide

BICS Connectivity for Web Intelligence in SAP BI 4.0

Balance-Sheet and Cash-Flow Planning with SAP NetWeaver BI

SAP Business One. General Ledger Transactions Generated from Order to Invoice. ESAP SAP Business One Online University

BusinessObjects XI. New for users of BusinessObjects 6.x New for users of Crystal v10

Using Query Browser in Dashboards 4.0: What You Need to Know

How SAP Business Objects Dashboards Are Improving Decision Making at Caterpillar Parts Distribution

Managing your UniCard account online

August 2014 San Antonio Texas The Power of Embedded Analytics with SAP BusinessObjects

Lotus Notes Archive Guide

A Comparison of Enterprise Reporting Tools

Exploring SAP NetWeaver BW on SAP HANA in combination with SAP BusinessObjects BI 4.x

Portal View Login to Griffith Portal

Comparison of Enterprise Reporting Tools

Office of the Registrar. Introduction to PeopleSoft Reporting Tools Query

Provisional Master Data in Integrated Business Planning for SAP Simple Finance An Example-Based How-To Guide

SAP Business Objects Security

CISCO VPN CLIENT INSTALL AND UPDATE INSTRUCTIONS

Transcription:

SAP Business Warehouse/Business Intelligence Reporting BW/BI Security Washington State HRMS Business Warehouse/Business Intelligence (BW/BI) BW/BI Power User Workshop Materials General Topics BW/BI Power Users Section 8

BW/BI Security The following section provides an overview of BW/BI Security. Business Intelligence BW/BI Security BW/BI Environment Business Explorer (BEx) BW/BI Security Overview Structural Authorizations Security Variables Exercise 4 Exercise 5 8 -BW/BI Power User Workshop -BW/BI Security 2

BW/BI Security Overview The ability to access BW/BI reports, specific functions, and data within the BW/BI environment is controlled by HRMS BW/BI Security: 1. BW/BI User Role The ability to access specific functions in BW/BI is controlled through roles. Agency HRMS BW/BI users will be mapped to either a BW/BI End User or BW/BI Power User role. All BW/BI users can access reports via the HRMS Portal. Only Power Users can develop ad hoc queries against data available within the BW/BI structures. 2. BW/BI InfoProvider Role The ability to access BW/BI data structures (InfoProviders) is controlled by a BW/BI InfoProvider Role. Agency HRMS BW/BI users will be mapped to either an HR/Payroll/Time data or- HR/Payroll/Time with Financial data or Financial data only or HR/Payroll/Time with Grievance data or Grievance data only InfoProvider Role. 3. BW/BI Data Security The ability to access report results is controlled through the organization structure within the security and role mapping setups. BW/BI data structures apply an additional level of data security for specific values such as SSN, Name, etc. 8 -BW/BI Power User Workshop -BW/BI Security 3

Structural Authorizations BW/BI Data Security BW/BI Data Security is based on Structural Authorizations. Structural Authorizations are defined in HRMS (SAP R/3) and are loaded to the BW/BI on a nightly basis. Structural Authorizations restrict the display of data based on the user s organization structure within the security and role mapping setups. Some InfoObjects within BW/BI are considered confidential (for example, SSN and Name). BW/BI Security will check Structural Authorizations to ensure the user receives results for only the data they have access to. 8 -BW/BI Power User Workshop -BW/BI Security 4

Structural Authorizations In BW/BI, there are two characteristics identified as confidential InfoObjects: 1. Employee (0EMPLOYEE) 2. Person (0PERSON) BW/BI security will check Structural Authorizations when these two characteristics are included in queries and reports. This will ensure the user receives results for only the data they have access to. Employee Characteristic Person Characteristic 8 -BW/BI Power User Workshop -BW/BI Security 5

Structural Authorizations Employee and Person have display-only attributes that are located in the Attributes folder of the characteristic. These display-only attributes can only be included in a query or report if Employee or Person characteristics are also included. Display-only attributes of Employee selection Display-only attributes of Person selection Display-only Attribute of Employee Display-only Attributes of Person Display-only attributes of Employee Display-only attributes of Person 8 -BW/BI Power User Workshop -BW/BI Security 6

Security Variables Security Variables are variables in a query or report that check Structural Authorizations. If Employee or Person characteristics are included in a query or report, a Security Variable must also be included. When a Security Variable is included with the Employee or Person characteristics, BW/BI Security will check Structural Authorizations. This will ensure the user receives results for only the data they have access to. If a Security Variable is not included with the Employee or Person characteristics, BW/BI Security will return an authorization error for users who do not have statewide access. An example of the authorization error is displayed below: 8 -BW/BI Power User Workshop -BW/BI Security 7

Security Variables Employee and Person is a No Display type of Security Variables: No Display: Does not prompt users to select an Employee or Person prior to running the query. Automatically returns data the user has security access to. Security Variables for Employee and Person include: Employee (0EMPLOYEE): No Display: Employee Sec (AUTH) Person (0PERSON): No Display: Person Sec (AUTH) Employee Security Variable Person Security Variable 8 -BW/BI Power User Workshop -BW/BI Security 8

Security Variables The example below shows the results of using Employee and Person characteristics with Security Variables. Security Variables If the user has authorization to view only one employee, only one employee s data will be displayed. Sample of an ad hoc query with Confidential InfoObjects and Security Variables Result: Return data for employees the user has access to 8 -BW/BI Power User Workshop -BW/BI Security 9

SAP Business Warehouse / Business Intelligence Reporting Exercise 4 Adding Confidential InfoObjects Washington State HRMS Business Warehouse/Business Intelligence (BW/BI) BW/BI Power User Workshop Materials General Topics BW/BI Power Users BW/BI Power User Workshop - Exercise 4

SAP Business Warehouse / Business Intelligence Reporting Exercise 5 Deleting an Existing Ad Hoc Query Washington State HRMS Business Warehouse/Business Intelligence (BW/BI) BW/BI Power User Workshop Materials General Topics BW/BI Power Users BW/BI Power User Workshop - Exercise 5