Continuing with my earlier blog BusinessObjects Administration – Setting up security model – An easy way to configure and manage. In this blog we are going to see the different security model designs which I came across throughout my experience. Here are some of them

1. Basic setup with Functional user categorization


This is the basic setup without any application/Department wise user categorization. Users will be categorized only based on their functionality (Viewer/Analyst/Author). This means users can view data across different applications and there is virtually no restriction on viewing the BI content. Functionalities enabled for each user category is described here in my previous blog  BusinessObjects Administration – Setting up security model – An easy way to configure and manage

Graphical representation of the model


Model 1.jpg

2. Hybrid setup with inherited user category

In this model, Users are segregated by each Application/department first. The subsequent user categorization would be additive in nature and the hierarchy will fall from least privileged group to most privileged group by making use of Group level inheritance capability. Similar to type 1 model, users of Application/department can view all the reports but only within their department.


Graphical representation of the model


Model 2.jpg


3. Hybrid setup  with cross Application/departmental & user category


This is the most effective and commonly used security model across various BusinessObjects deployments. Compared to previous two models this model ensures the BI content is accessed in a highly secured way i.e. reports are viewed by only group of users who are intended to do so. Here user groups within the department will be having distinct functional access rather than additive functional access as compared to that of type 2 model.


Graphical representation of the model

Model 3.jpg

Let us see about each model in detail in upcoming blogs. Keep reading.


Related blogs


BusinessObjects Administration – Setting up security model – An easy way to configure and manage

BusinessObjects Administration – Setting up security model – Part III



To report this post you need to login first.

1 Comment

You must be Logged on to comment or reply to a post.

Leave a Reply