Blogs tagged data access profile
-
In this blog I have documented the steps we followed while setting up authorizations and row level security in our SAC Planning project. As authorization requirements are different in each project, this blog will be a good starting point if you are... Read More »0Comments3Likes -
Introduction BPC embedded “lives on” BW and many BW concepts are present in BPC embedded.This is also the case with authorizations. The BW feature of Analysis Authorizations is extended in BPC embedded to accommodate additional... Read More »1Comment3Likes -
Abstract Preface Analysis Authorizations and DAPs Calculating the DAP-Authorization Part Relevant Providers The Lifting Algorithm Examples 1. Unique Mapping 2. Complex Mappings 3. HCPR with External Part Provider Intersecting the DAP... Read More »1Comment6Likes -
In BPC 10.1, two different models are supported: standard and embedded. For Embedded model, Analysis for Office (AFO) could be used as reporting tool, but the place we need to pay attention is the data security setting. As we know, there are 3... Read More »1Comment1Like -
We take a brief look at the authorization objects that need to be included in a PFCG-role for a user that is only allowed to do the bare minimum in BPC embedded: Open a report or input form in the web frontend. We assume that the report or input... Read More »1Comment2Likes