Application Development Blog Posts
Learn and share on deeper, cross technology development topics such as integration and connectivity, automation, cloud extensibility, developing at scale, and security.
cancel
Showing results for 
Search instead for 
Did you mean: 

Hello,

here you find one of my two security approaches for the Business Objects 4.1 Environment.

Functional / Access Approach
Groups:F_ReporterF_SchedulerF_PowerUserA_MarketingA_SalesA_Production
FolderTop LevelAL_F_Reporter (*1)AL_F_Scheduler (*2)

AL_F_PowerUser

(*3)

View_This_Only(*4)View_This_OnlyView_This_Only
Marketing(AL_F_Reporter)(AL_F_Scheduler)(AL_F_PowerUser)AL_A_Marketing (*5)--
Sales(AL_F_Reporter)(AL_F_Scheduler)(AL_F_PowerUser)-AL_A_Sales-
Production(AL_F_Reporter)(AL_F_Scheduler)(AL_F_PowerUser)--AL_A_Production

(**) Notes:

(*1) = like "Edit Query", "Create New Report", "Delete Report"

(*2) = like "Schedule Document to run","Schedule to Destination"

(*3) = like "Create User","Add User to Group""Delete Objects"

(*4) = like "View Objects" at Object (Top Level), without inheritance

(*5) = "View Object"

Kind regrads,

Sebastian