Skip to Content

SecurityIn this half-hour webinar, Tony Lusk, Senior OEM Consultant, discusses using third-party technologies with the BusinessObjects Enterprise XI Release 2 Security model. Topics include 1) Authentication versus authorization, 2) How BusinessObjects Enterprise XI Release 2 can leverage third-party Authentication, 3) Setting up authorization at the report level, and 4) How to set up row-level data security. Click here to view the webinar. Once you are done, you can download the PowerPoint slides here.

To report this post you need to login first.

2 Comments

You must be Logged on to comment or reply to a post.

  1. Former Member
    Hi,

    Will you be able to direct me to the doc’s relating to business objects? We are currently implementing it and will be using this product for bank analyzer.

    Your help in this regard is greatly appreciated.

    Kind Regards,
    Melvin Button

    (0) 
    1. Kirby Leong Post author
      Hi Melvin

      Sorry for the late reply. We have quite a few official guides on the help portal. Check them out and let me know what you think.

      Cheers,

      Kirby

      (0) 

Leave a Reply