SAP Business Objects Security



Similar documents
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence

BusinessObjects Enterprise XI Release 2 Administrator s Guide

Getting Started with Multitenancy SAP BI 4.1

Extending Microsoft Windows Active Directory Authentication to Access HP Service Health Reporter

Exam Information Guide

Christian Ah-Soon and David François Gonzalez SAP. BusinessObjects BI Security. Bonn Boston

Understanding Security and Rights in SAP BusinessObjects Business Intelligence 4.1

BUSINESS OBJECTS EDGE

Welcome to the Technical Stream

Business Objects Course outline: =======================

How To Upgrade Your System With Bib

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

BusinessObjects XI R2 Product Documentation Roadmap

August 2014 San Antonio Texas The Power of Embedded Analytics with SAP BusinessObjects

Tips and tricks for using SAP BusinessObjects Web Intelligence with SAP BW

By Makesh Kannaiyan 8/27/2011 1

Installation Manual for Setting up SAP Business Objects BI 4.0 Edge System

Single Sign-on (SSO) technologies for the Domino Web Server

InfoView User s Guide. BusinessObjects Enterprise XI Release 2

SAP BusinessObjects Business Intelligence (BI) platform Document Version: 4.1, Support Package Report Conversion Tool Guide

User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008

CRYSTAL REPORTS SERVER XI Functional Overview

Overview. Edvantage Security

Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

OBIEE 11g Security it s as easy as 1-2-3!

Crystal Server Upgrade Guide SAP Crystal Server 2013

CA Business Intelligence

SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401

CA Business Intelligence for CA Service Desk Manager

Continuous Improvement with CA Service Desk Manager KPIs. Rich Magnuson

Installation Guide for Windows

CA Business Intelligence

Oracle E-Business Suite - Oracle Business Intelligence Enterprise Edition 11g Integration

HP Software as a Service. Federated SSO Guide

SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package Patch 3.x Update Guide

WHITE PAPER. Domo Advanced Architecture

Single Sign-on Configuration for SharePoint Integration

BusinessObjects Enterprise XI Release 2 Administrator s Reference Guide

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON. Chad Watson Sr. Business Intelligence Developer

ROI from your BI Using SAP BusinessObjects as your SaaS Solution. Kevin McManus CEO, LaunchWorks Chance Barkley BI Analyst - AmerisourceBergen

SBOP Repository Explorer. Installation and Configuration Guide v (2014)

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

CA Single Sign-On Migration Guide

SAML-Based SSO Solution

BusinessObjects Enterprise InfoView User's Guide

Enabling single sign-on for Cognos 8/10 with Active Directory

Crystal Reports Server Quick Installation Guide

CIFS Permissions Best Practices Nasuni Corporation Natick, MA

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator

Business Objects Online training Contents SAP BUSINESS OBJECTS 4.0/XI 3.1. We provide online instructor led Business Objects Training.

In this topic we will cover the security functionality provided with SAP Business One.

Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0

Administering Google Apps & Chromebooks for Education

CA Business Intelligence

Viewing Documents Using OpenDocument SAP BusinessObjects Business Intelligence platform 4.0 Support Package 2

Desktop Web Access Single Sign-On Configuration Guide

Enterprise Knowledge Platform

CA SiteMinder SSO Agents for ERP Systems

Sisense. Product Highlights.

BusinessObjects 4.0 Windows AD Single Sign on Configuration

BusinessObjects XI. New for users of BusinessObjects 6.x New for users of Crystal v10

CA SiteMinder. Implementation Guide. r12.0 SP2

Architecture Guidelines Application Security

John D. Bonam Disaster Recovery Architecture Session # 2841

Pick Your Identity Bridge

Creating and Scheduling Publications for Dynamic Recipients on SAP Business Objects Enterprise

SAP BusinessObjects BI Platform Document Version: Recommendations for Conversion Using the Report Conversion Tool

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Radvision Video Conferencing Policies and Procedures10/25/2012 2:02:00 PM

SAS 9.3 Management Console

MicroStrategy Course Catalog

Perceptive Experience Single Sign-On Solutions

Denodo Data Virtualization Security Architecture & Protocols

Propalms TSE Quickstart Guide

SAP Business Objects XIR3.0/3.1, BI 4.0 & 4.1 Course Content

Business Objects BI Server Installation Guide - Windows

How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On

Crystal Reports Server 2008 V1 Upgrade Guide Crystal Reports Server 2008 V1

WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices

Active Directory Compatibility with ExtremeZ-IP

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Migrating documents from Business Objects Reporter to Web Intelligence XI R2

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

Web Applications Access Control Single Sign On

Talis Decisions InfoView and Web Intelligence

Agenda. How to configure

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2

Charl du Buisson Charl du Buisson Britehouse Specialist SAP Division

PRiSM Security. Configuration and considerations

Transcription:

SAP Business Objects Security Pal Alagarsamy President Business Intelligence Practice GloWiz Inc 1

GloWiz Inc GloWiz is an IT Staffing and Consulting company since 2005 We focus on Business Intelligence, Data Warehouse, Project Management and Architects Our BI Practice, particularly BOE includes; BOE Environment Assessment Requirement Analysis Installation and Configuration (R2, XI 3.x) Dashboard Development Report Development System Administration and Support Security Setup and Management 5.x or 6.x or R2 to XI 3.x Migration BI Implementation & Best Practices BO Training GloWiz Inc, 11801 Rockville Pike, Suite 403, Rockville MD 20852 P: BOE (877) XI 3.x 456-9490 Security F: (877) 766-4240 Email: info@glowizinc.com Web: www.glowizinc.com 2

Agenda 1 2 3 4 5 6 7 Business Objects Security Overview Authentication and Authorization Primary Authentication and SSO Other BOE Security and Protections Central Management Console (CMC) Out of the Box Security Security Best Practices 3

1. Business Objects Security Overview Business Objects Enterprise provides a framework for an increasing number of products within BOE family. This presentation explores how this framework enforces and maintains security More specifically this focuses on BOE XI 3.x version 4

2. Authentication and Authorization Authentication is the process of verifying the identity of a user who attempts to use Business Objects Enterprise system. Authentication type can be Enterprise or Third Party Authentication such as LDAP or Windows AD. Authentication Flow: InfoView SDK Security Plug-In CMS. 5

2. Authentication and Authorization Authorization is the process of verifying the user has sufficient rights to perform the requested action upon a given objects. Action means to view, refresh, edit, schedule, etc. Object means folder, report, instance, universe, etc. Authorization is handled based on how the access level, application security, and content security such as users and groups, universe security, folder access, etc. are defined using CMC. 6

3. Primary Authentication and SSO Primary authentication occurs when the user first attempts to access Business Objects through InfoView or CMC. Single sign-on means once the user has entered his/her credentials to the Windows OS or LDAP, they can access Business Objects applications without having to enter the user credentials again. The following table describes out of the box methods of single sign-on support for InfoView and CMC. Authentication Mode Options Comments Windows AD Windows AD with Kerberos only Windows AD authentication to InfoView and CMC is available out of the box LDAP LDAP with SiteMinder only LDAP authentication to InfoView and CMC is available out of the box. SSO requires SiteMinder Enterprise Trusted Authentication Enterprise authentication to InfoView and CMC is available out of the box. SSO requires Trusted Authentication 7

3. Primary Authentication and SSO Security plug-ins for the SSO is shipped out of the box and installed as part of BOE installation. These security plug-ins facilitates you to create and manage user accounts by allowing you to map users and groups from third party systems to BOE. Single Sign-on contexts can be 1. SSO to Enterprise, 2. SSO to Database, or 3. End to end SSO. InfoView SDK Security Plugin CMS 8

4. Other BOE Security and Protections Active trust relationship provides secured and seamless access to various applications within BOE through logon token and ticket mechanism. Session and session tracking using cookies and session variable. Environment protection between browser to web server and web server to BOE. Protection against malicious logon attempts through auditing web activities by logon restrictions, password restrictions, and user restrictions 9

5. Central Management Console (CMC) CMC is a web based tool helps you to perform day-to-day administrative tasks including user management, content management, and server management. Most of the authorization part is created, administered and maintained in CMC. This includes; Access Levels and Inheritance Application Security Content Objects Security 10

6. Access Levels and Inheritance Access level is a set of rights that users frequently need. BOE comes with pre-defined out of the box access levels such as Administrator, Full Access, Schedule, View and View on Demand. However you can create and customize your own access levels. Rights are set on an object for a user in order to control the access to the specific objects. It is highly impractical to set this individually when there are hundreds of objects. Inheritance resolves this impractical situation by passing on the set of rights from a group to sub-group or from a folder to subfolder. 11

7. Applications Security CMC allows you to control the appearance and features of tools such as, InfoView Desktop Intelligence Web Intelligence You can use user rights to control the user access of certain features in Business Objects applications. 12

8. Users and Groups CMC is your one stop shop for user and group management whether you use Enterprise or third party authentication type with or without SSO. By default, the BOE out of the box comes with two users, Administrator and Guest. Group is a collection of users who share the same account privileges. A group can have sub-groups which may share the same or a sub-set of the parent group privileges. Users can be added to a group or sub-group or more than one groups or sub-groups. When groups with different access levels are enabled to other contents such as folders, categories, universe or connections, the users from the group automatically inherit the rights. 13

9. Universe and Connection Security Universe security is managed at two levels CMC and Universe Designer. From CMC restrictions such as access level, users and groups, and usage rights can be applied and stored in CMS. From Universe Designer restrictions such as Connection, Query Controls, SQL Generation, Object Access, Row Access, Alternate Table Access can be defined. Restriction is a powerful security feature. You can apply restrictions to a selected user or group for a universe. 14

10. Content Objects Security User security can be defined at the most granular level for the following content objects. Folders and sub-folders Reports Categories Events Program Files Publications Content level security is helpful to when users have different level of access across applications. 15

11. Out of the Box Security BOE comes with following out of the box security. Access Levels Full Control Schedule View View on Demand Application Security Content Designer Web Intelligence CMC, etc. 16

11. Out of the Box Security Users and Groups Administrators Everyone Universe Designer Users Applications (Default Settings) CMC InfoView Web Intelligence Desktop Intelligence, etc. 17

12. Security Best Practices Create a security matrix for each of your application Leverage out of the box access levels. Create new access level only when necessary. Use common naming convention for your application across report folder, universe folder, user groups, and access levels. Follow universe development best practices particularly connection, control, SQL generation, and restrictions. 18

12. Security Best Practices Leverage the use of Inheritance while defining folder, subfolder, user and group security. Simplify the security model. Complex model may cause performance issue especially when SSO is implemented. 19

THANK YOU! Pal Alagarsamy pal@glowizinc.com