Preview

Column Level Security With Idt

Powerful Essays
Open Document
Open Document
1010 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Column Level Security With Idt
Column-Level Security with Information Design Tool: Using Business
Security Profiles to Secure Objects and Customize the Reporting
Experience
One of the new universe security features in Information Design Tool (IDT) is the Business Security
Profile, which allows universe designers to assign column-level security on objects and apply profiles directly to users and groups. Business Security Profiles provide advanced and flexible object security, which is an overall improvement compared to the all-or-nothing approach with legacy Universe Design
Tool.
Pros and Cons

The added flexibility means fewer universes to develop and maintain since you can achieve more with a single universe. I am particularly pleased that SAP included a distinction between “Create Query” and
“Display Data” object security. This is a relatively simple security method with powerful possibilities.
There is no denying that all these new features (and the extra steps involved at every level) have greatly complicated the universe design process. The learning curve is steep, but I still find many of these features useful. Business Security Profiles are assigned directly to users and groups from the IDT Security
Editor. I personally find this quick and easy, but it could pose a challenge to organizations with distinct admin and designer roles. While SAP still has some bugs to work out, the feature generally works as intended. *Note - currently Business Security Profiles are only functional with Webi in the Java-based (Rich Internet
Application) viewing mode. With the security method I outline below, a profiled user who opens the Webi query browser in HTML mode will not see any objects (definitely not ideal… but at least still secure). This should be resolved in SP4 Patch 10 and SP6 (SAP Note: 1800742).
Use Case

I first discovered this feature while working with an OEM client developing a packaged BusinessObjects universe along with dashboards and canned reports. The dashboards/reports rely heavily on

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The security controls for this or any project should be a high priority and should be understood by every individual involved in the project. To determine this we will use the questions…

    • 775 Words
    • 4 Pages
    Good Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    vi. Each user and workforce member must ensure that their assigned User Identification is appropriately protected and only used for legitimate access to networks, systems, or applications. If a user or workforce members believes their user identification has been comprised, they must report that security incident to the appropriate Security Officer…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Select one of the company profiles below to be used for your Information Security Policy…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 Proposal

    • 315 Words
    • 2 Pages

    Grauer, R. T., Poatsy, M. A., Mulbery, K., Hulett, M., Krebs, C., & Mast, K. (2011). Microsoft® Office 2010: Volume 1. Upper Saddle River, NJ: Pearson Prentice Hall.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Security Organization Provides information on the structure of the information security organization and individuals that fulfill the information security role Scope  This Information Security Policy applies to the City of Chicago, its departments, commissions, boards, offices, and agencies, and all officers, employees, temporary employees, interns, vendors, consultants, contractors and agents thereof--collectively referred to as ―User(s)‖. The principles set forth in this Policy are applicable to all information technology and assets, in all…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    To make sure no one can penetrate your web application before you put it in a live situation.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Sap Mm

    • 784 Words
    • 4 Pages

    To carry out transactions such as PO creation/Open Order updation in SAP/Rejection Material Approval process/ MPS & MRP in SAP.…

    • 784 Words
    • 4 Pages
    Good Essays
  • Good Essays

    2. What is a SAP Business Objects Universe and how does it fit in with Web Intelligence Reporting?…

    • 298 Words
    • 1 Page
    Good Essays