Technology Blogs by Members
Explore a vibrant mix of technical expertise, industry insights, and tech buzz in member blogs covering SAP products, technology, and events. Get in the mix!
cancel
Showing results for 
Search instead for 
Did you mean: 

Hello,

here you find one of my two security approaches for the Business Objects 4.1 Environment.

Functional / Access Approach
Groups:F_ReporterF_SchedulerF_PowerUserA_MarketingA_SalesA_Production
FolderTop LevelAL_F_Reporter (*1)AL_F_Scheduler (*2)

AL_F_PowerUser

(*3)

View_This_Only(*4)View_This_OnlyView_This_Only
Marketing(AL_F_Reporter)(AL_F_Scheduler)(AL_F_PowerUser)AL_A_Marketing (*5)--
Sales(AL_F_Reporter)(AL_F_Scheduler)(AL_F_PowerUser)-AL_A_Sales-
Production(AL_F_Reporter)(AL_F_Scheduler)(AL_F_PowerUser)--AL_A_Production

(**) Notes:

(*1) = like "Edit Query", "Create New Report", "Delete Report"

(*2) = like "Schedule Document to run","Schedule to Destination"

(*3) = like "Create User","Add User to Group""Delete Objects"

(*4) = like "View Objects" at Object (Top Level), without inheritance

(*5) = "View Object"

This Posting comes from my Personal SCN/SDNAdventureTime Blog.

Kind regrads,

Sebastian

4 Comments
Labels in this area