Acknowledgments |
|
21 | (2) |
|
1 Introduction to Security in SAP BusinessObjects Business Intelligence 4.0 |
|
|
23 | (10) |
|
1.1 Business Intelligence Overview |
|
|
23 | (1) |
|
1.2 System Security Considerations |
|
|
24 | (2) |
|
1.3 A Brief History of Business Objects |
|
|
26 | (1) |
|
1.4 SAP BusinessObjects Business Intelligence 4.0 Review |
|
|
27 | (2) |
|
|
29 | (4) |
|
2 Administration and Security |
|
|
33 | (34) |
|
|
34 | (2) |
|
|
36 | (8) |
|
2.2.1 Components Installed with BI 4.0 Server Installer |
|
|
36 | (3) |
|
2.2.2 BI 4.0 Server Installation Workflow |
|
|
39 | (4) |
|
2.2.3 BI Platform Client Tools |
|
|
43 | (1) |
|
2.2.4 Other BI 4.0 Suite Installers |
|
|
44 | (1) |
|
|
44 | (3) |
|
2.3.1 Central Configuration Manager (CCM) |
|
|
45 | (1) |
|
2.3.2 Central Management Console (CMC) |
|
|
46 | (1) |
|
2.4 CMS Repository and File Repository Server |
|
|
47 | (6) |
|
2.4.1 InfoObjects and Physical Files |
|
|
47 | (1) |
|
2.4.2 InfoObject Structure |
|
|
48 | (3) |
|
2.4.3 CMS Database Structure |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (5) |
|
|
53 | (2) |
|
|
55 | (3) |
|
|
58 | (4) |
|
2.6.1 Adaptive Job Server |
|
|
60 | (1) |
|
2.6.2 Adaptive Processing Server |
|
|
61 | (1) |
|
|
62 | (3) |
|
|
63 | (2) |
|
|
65 | (1) |
|
|
65 | (2) |
|
3 Users and Authentication |
|
|
67 | (78) |
|
|
68 | (5) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (2) |
|
|
72 | (1) |
|
3.1.5 Enabling Authentication Selection for BI Launch Pad |
|
|
72 | (1) |
|
3.2 Enterprise Users and Groups |
|
|
73 | (7) |
|
|
73 | (2) |
|
3.2.2 User Personal Folders |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
3.2.6 Deleting Users and Groups |
|
|
79 | (1) |
|
3.3 Managing Users and Groups in the CMC |
|
|
80 | (14) |
|
3.3.1 Viewing Users and Groups |
|
|
80 | (1) |
|
3.3.2 Creating Enterprise Users |
|
|
81 | (1) |
|
3.3.3 Creating Enterprise Groups |
|
|
82 | (1) |
|
3.3.4 Creating Users and Groups from CSV File |
|
|
82 | (3) |
|
3.3.5 Editing User Parameters |
|
|
85 | (1) |
|
3.3.6 Enabling/Disabling Users |
|
|
85 | (1) |
|
3.3.7 Adding Users and Groups to Groups |
|
|
86 | (1) |
|
3.3.8 Removing Users or Groups From Groups |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (2) |
|
3.3.12 Defining BI Launch Pad Preferences |
|
|
91 | (2) |
|
3.3.13 Setting Enterprise Parameters |
|
|
93 | (1) |
|
3.4 Trusted Authentication |
|
|
94 | (5) |
|
3.4.1 Sharing Shared Secret Key |
|
|
95 | (1) |
|
3.4.2 Passing Shared Secret |
|
|
95 | (1) |
|
|
96 | (3) |
|
3.5 Aliases and External Authentications |
|
|
99 | (7) |
|
|
100 | (1) |
|
3.5.2 Mapping Users from External Sources |
|
|
101 | (3) |
|
|
104 | (1) |
|
3.5.4 Updating Groups and Users |
|
|
104 | (2) |
|
3.5.5 Scheduling Groups and Users Update |
|
|
106 | (1) |
|
3.6 Managing Aliases in the CMC |
|
|
106 | (5) |
|
|
107 | (1) |
|
|
108 | (1) |
|
3.6.3 Reassigning an Alias |
|
|
109 | (1) |
|
3.6.4 Enabling/Disabling an Alias |
|
|
110 | (1) |
|
|
111 | (1) |
|
3.7 Managing LDAP Authentication in the CMC |
|
|
111 | (10) |
|
3.7.1 Configuring LDAP Parameters |
|
|
111 | (8) |
|
3.7.2 Editing LDAP Authentication Parameters |
|
|
119 | (2) |
|
3.8 Managing Active Directory Authentication |
|
|
121 | (21) |
|
3.8.1 Creating Dedicated Active Directory Accounts |
|
|
122 | (3) |
|
3.8.2 Starting BI 4.0 with Dedicated Account |
|
|
125 | (3) |
|
3.8.3 Configuring AD Authentication into a BI 4.0 System |
|
|
128 | (3) |
|
3.8.4 Configuring BI 4.0 with Kerberos |
|
|
131 | (1) |
|
|
132 | (1) |
|
3.8.6 Creating bscLogin.conf |
|
|
133 | (1) |
|
3.8.7 Modifying the Java Options for Kerberos |
|
|
133 | (2) |
|
3.8.8 Creating a Keytab File |
|
|
135 | (2) |
|
3.8.9 Increasing Header Size |
|
|
137 | (1) |
|
3.8.10 Configuring Web Applications |
|
|
138 | (1) |
|
3.8.11 Configuring Browsers |
|
|
139 | (2) |
|
3.8.12 Editing Active Directory Configuration |
|
|
141 | (1) |
|
|
142 | (3) |
|
|
145 | (42) |
|
|
145 | (1) |
|
4.2 General and Specific Rights |
|
|
146 | (2) |
|
|
148 | (7) |
|
|
149 | (1) |
|
|
150 | (2) |
|
4.3.3 General and Type-Specific Rights |
|
|
152 | (1) |
|
|
153 | (1) |
|
4.3.5 Breaking Inheritance and Overriding Rights |
|
|
154 | (1) |
|
4.4 Non-Owner and Owner Versions of Rights |
|
|
155 | (2) |
|
4.5 Objects General Rights |
|
|
157 | (6) |
|
4.5.1 General Rights in Detail |
|
|
159 | (3) |
|
4.5.2 General Rights Related to Scheduling |
|
|
162 | (1) |
|
4.6 Application General Rights |
|
|
163 | (2) |
|
4.7 Managing Rights in the CMC |
|
|
165 | (6) |
|
|
165 | (3) |
|
4.7.2 Assigning Advanced Rights |
|
|
168 | (3) |
|
4.7.3 Assigning Advanced Rights to a Top-Root Folder |
|
|
171 | (1) |
|
4.7.4 Unassigning Advanced Rights |
|
|
171 | (1) |
|
|
171 | (4) |
|
4.8.1 Predefined Access Levels |
|
|
172 | (1) |
|
4.8.2 Custom Access Levels |
|
|
173 | (1) |
|
|
174 | (1) |
|
4.9 Managing Access Level in the CMC |
|
|
175 | (6) |
|
4.9.1 Creating an Access Level |
|
|
175 | (1) |
|
4.9.2 Setting Access Level Rights |
|
|
176 | (2) |
|
4.9.3 Copying an Access Level |
|
|
178 | (1) |
|
4.9.4 Renaming an Access Level |
|
|
178 | (1) |
|
4.9.5 Assigning an Access Level to an Object |
|
|
179 | (1) |
|
4.9.6 Deleting an Access Level |
|
|
180 | (1) |
|
4.10 Running Administration Queries in the CMC |
|
|
181 | (4) |
|
4.10.1 Running a Security Query |
|
|
181 | (3) |
|
4.10.2 Running a Relationship Query |
|
|
184 | (1) |
|
|
185 | (2) |
|
5 Applications and Rights Reference |
|
|
187 | (100) |
|
|
188 | (6) |
|
|
194 | (2) |
|
|
196 | (3) |
|
5.4 Analysis, Edition for OLAP |
|
|
199 | (1) |
|
5.4.1 Analysis, Edition for OLAP Rights |
|
|
199 | (1) |
|
5.4.2 Analysis View and Analysis Workspace Rights |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (2) |
|
|
202 | (1) |
|
|
203 | (3) |
|
5.8.1 BI Workspaces Rights |
|
|
203 | (2) |
|
5.8.2 BI Workspace Rights |
|
|
205 | (1) |
|
|
206 | (1) |
|
5.9 Central Management Console |
|
|
206 | (1) |
|
|
207 | (2) |
|
5.10.1 Crystal Reports Configuration Rights |
|
|
208 | (1) |
|
5.10.2 Crystal Reports Document Rights |
|
|
208 | (1) |
|
|
209 | (12) |
|
|
210 | (1) |
|
5.11.2 Information Space Security |
|
|
211 | (3) |
|
|
214 | (7) |
|
5.11.4 Information Space Rights |
|
|
221 | (1) |
|
5.11.5 Exploration View Set Rights |
|
|
221 | (1) |
|
5.12 Information Design Tool |
|
|
221 | (7) |
|
5.12.1 Information Design Tool Rights |
|
|
222 | (3) |
|
|
225 | (3) |
|
5.13 Promotion Management |
|
|
228 | (8) |
|
5.13.1 Promoting Security |
|
|
229 | (1) |
|
5.13.2 Promotion Management Rights |
|
|
230 | (6) |
|
5.14 SAP BusinessObjects Mobile |
|
|
236 | (1) |
|
|
237 | (1) |
|
5.16 Universe Design Tool |
|
|
238 | (6) |
|
5.16.1 Universe Design Tool Rights |
|
|
238 | (3) |
|
|
241 | (3) |
|
|
244 | (5) |
|
|
249 | (1) |
|
|
250 | (27) |
|
5.19.1 Deployment Options |
|
|
251 | (2) |
|
|
253 | (1) |
|
5.19.3 Purge and Refresh on Open |
|
|
254 | (2) |
|
5.19.4 Web Intelligence Rights |
|
|
256 | (15) |
|
5.19.5 Web Intelligence Documents Rights |
|
|
271 | (6) |
|
|
277 | (2) |
|
|
279 | (4) |
|
5.21.1 Relational Connection Rights |
|
|
280 | (2) |
|
5.21.2 OLAP Connection Rights |
|
|
282 | (1) |
|
5.21.3 Data Federator Data Source Rights |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
5.23 Schedule Output Format |
|
|
284 | (1) |
|
|
285 | (2) |
|
6 Connections and Database Authentications |
|
|
287 | (30) |
|
|
288 | (5) |
|
6.1.1 Relational Connections |
|
|
288 | (1) |
|
6.1.2 Data Federator Data Sources |
|
|
289 | (1) |
|
6.1.3 OLAP Connections (Universe Design Tool) |
|
|
290 | (1) |
|
6.1.4 OLAP Connections (Information Design Tool/CMC) |
|
|
290 | (1) |
|
6.1.5 Relational Connections (Business View Manager) |
|
|
291 | (1) |
|
6.1.6 Product Consumptions |
|
|
292 | (1) |
|
|
293 | (2) |
|
6.2.1 Information Design Tool |
|
|
293 | (1) |
|
6.2.2 Universe Design Tool |
|
|
294 | (1) |
|
6.3 Connection Authentication Mode |
|
|
295 | (6) |
|
|
296 | (1) |
|
6.3.2 Credentials Mapping |
|
|
297 | (2) |
|
6.3.3 Prompted Authentication |
|
|
299 | (1) |
|
|
300 | (1) |
|
6.4 Using Credentials Mapping for Single Sign-On |
|
|
301 | (2) |
|
|
303 | (11) |
|
6.5.1 Managing Connections in Information Design Tool |
|
|
303 | (6) |
|
6.5.2 Managing Connections in Universe Design Tool |
|
|
309 | (3) |
|
6.5.3 Managing Connections in the CMC |
|
|
312 | (2) |
|
|
314 | (3) |
|
7 Universe Security in Universe Design Tool |
|
|
317 | (44) |
|
|
318 | (5) |
|
7.1.1 Relational Universe |
|
|
320 | (1) |
|
|
320 | (2) |
|
|
322 | (1) |
|
|
323 | (1) |
|
7.2 Using Filters on Table, Object, Class, or Universe |
|
|
323 | (2) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
7.3 Using Filters in Universe Design Tool |
|
|
325 | (5) |
|
7.3.1 Defining an Auto-join |
|
|
326 | (1) |
|
7.3.2 Defining a WHERE Clause on an Object |
|
|
327 | (1) |
|
7.3.3 Defining a Mandatory Filter |
|
|
328 | (1) |
|
7.3.4 Exporting a Universe in a CMS Repository |
|
|
329 | (1) |
|
7.4 Access Restriction Definition |
|
|
330 | (7) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
7.5 Access Restriction Aggregation |
|
|
337 | (2) |
|
7.5.1 Connection, SQL, Controls, and Table Mapping |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
7.6 Managing Access Restrictions in Universe Design Tool |
|
|
339 | (15) |
|
7.6.1 Opening the Manage Access Restrictions Dialog Box |
|
|
339 | (1) |
|
7.6.2 Creating and Editing Access Restrictions |
|
|
340 | (7) |
|
7.6.3 Assigning Access Restrictions |
|
|
347 | (1) |
|
7.6.4 Un-Assigning Access Restrictions |
|
|
348 | (1) |
|
7.6.5 Defining Group Priority for Access Restrictions |
|
|
348 | (1) |
|
7.6.6 Setting Row Restriction Aggregation |
|
|
349 | (1) |
|
7.6.7 Preview Net Results |
|
|
350 | (2) |
|
7.6.8 Deleting Access Restrictions |
|
|
352 | (1) |
|
7.6.9 Setting AUTO_UPDATE_QUERY Parameter |
|
|
353 | (1) |
|
|
354 | (1) |
|
7.8 Managing Object Access Levels |
|
|
355 | (4) |
|
7.8.1 Defining Object Access Levels in Universe Design Tool |
|
|
356 | (1) |
|
7.8.2 Defining User Access Levels in CMC |
|
|
357 | (1) |
|
7.8.3 Editing User Access Levels in CMC |
|
|
358 | (1) |
|
7.8.4 Removing User Access Levels in CMC |
|
|
358 | (1) |
|
|
359 | (2) |
|
8 Universe Security in Information Design Tool |
|
|
361 | (82) |
|
8.1 Introduction to New Universe |
|
|
362 | (4) |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
365 | (1) |
|
8.2 Defining WHERE Clauses and Filters in Information Design Tool |
|
|
366 | (4) |
|
8.2.1 Defining an Auto-join in Information Design Tool |
|
|
367 | (1) |
|
8.2.2 Defining a WHERE Clause on an Object |
|
|
367 | (1) |
|
8.2.3 Defining a Mandatory Filter |
|
|
368 | (1) |
|
8.2.4 Publishing a Universe in CMS Repository |
|
|
369 | (1) |
|
|
370 | (5) |
|
8.3.1 Assigned Users and Groups |
|
|
371 | (1) |
|
|
372 | (1) |
|
8.3.3 AND, ANDOR, and OR Aggregation |
|
|
373 | (2) |
|
|
375 | (1) |
|
8.4 Data Security Profiles |
|
|
375 | (7) |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
378 | (2) |
|
|
380 | (1) |
|
|
381 | (1) |
|
8.5 Business Security Profiles |
|
|
382 | (13) |
|
|
383 | (4) |
|
|
387 | (3) |
|
8.5.3 Filters (Relational Universe) |
|
|
390 | (2) |
|
8.5.4 Filters (Multidimensional Universe) |
|
|
392 | (3) |
|
8.6 Managing Security Profiles in Information Design Tool |
|
|
395 | (36) |
|
8.6.1 Opening the Security Editor |
|
|
396 | (2) |
|
8.6.2 Switching Universe-Centric View and User-Centric View |
|
|
398 | (2) |
|
8.6.3 Creating a Data Security Profile |
|
|
400 | (8) |
|
8.6.4 Editing a Data Security Profile |
|
|
408 | (1) |
|
8.6.5 Creating a Business Security Profile |
|
|
408 | (13) |
|
8.6.6 Editing a Business Security Profile |
|
|
421 | (1) |
|
8.6.7 Assigning and Unassigning a Security Profile |
|
|
422 | (2) |
|
8.6.8 Show Universes with Assigned Security Profiles |
|
|
424 | (1) |
|
8.6.9 Setting Aggregation Options |
|
|
424 | (1) |
|
8.6.10 Setting Data Security Profile Priorities |
|
|
425 | (2) |
|
8.6.11 Deleting Security Profiles |
|
|
427 | (1) |
|
8.6.12 Show Inherited Security Profiles |
|
|
428 | (1) |
|
8.6.13 Preview Net Result |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
431 | (3) |
|
8.7.1 Object Access Level Overview |
|
|
431 | (1) |
|
|
432 | (1) |
|
8.7.3 Defining Object Access Level in Information Design Tool |
|
|
433 | (1) |
|
|
434 | (2) |
|
8.8.1 Defining User Attributes |
|
|
434 | (1) |
|
8.8.2 Using User Attributes |
|
|
434 | (1) |
|
8.8.3 User Attributes Substitution |
|
|
435 | (1) |
|
8.9 Managing User Attributes in the CMC |
|
|
436 | (3) |
|
8.9.1 Defining User Attributes in the CMC |
|
|
436 | (2) |
|
8.9.2 Setting User Attributes Value in the CMC |
|
|
438 | (1) |
|
8.9.3 Deleting User Attributes in the CMC |
|
|
439 | (1) |
|
8.10 Running a Secured Query |
|
|
439 | (2) |
|
|
441 | (2) |
|
9 Scheduling and Publishing |
|
|
443 | (24) |
|
9.1 Scheduling and Publishing Framework |
|
|
444 | (1) |
|
9.1.1 Support for Schedule and Publication |
|
|
444 | (1) |
|
9.1.2 Refresh During Schedule or Publication |
|
|
444 | (1) |
|
|
445 | (4) |
|
9.2.1 Scheduling Parameters |
|
|
445 | (2) |
|
9.2.2 Schedule For Option |
|
|
447 | (2) |
|
|
449 | (3) |
|
9.3.1 Publishing vs. Scheduling |
|
|
449 | (1) |
|
9.3.2 Publication Parameters |
|
|
450 | (2) |
|
9.4 Publication Recipients |
|
|
452 | (4) |
|
9.4.1 Dynamic Recipient Document |
|
|
452 | (1) |
|
9.4.2 Add Dynamic Recipients to a Publication |
|
|
453 | (2) |
|
9.4.3 Subscription and Unsubscription to a Publication |
|
|
455 | (1) |
|
9.5 Publication Personalization and Profile |
|
|
456 | (7) |
|
|
456 | (1) |
|
|
457 | (1) |
|
9.5.3 Creating a Global Profile |
|
|
458 | (3) |
|
9.5.4 Setting Profiles to a Publication |
|
|
461 | (2) |
|
9.6 Report Bursting Options |
|
|
463 | (3) |
|
9.6.1 One Database Fetch for All Recipients |
|
|
463 | (1) |
|
9.6.2 One Database Fetch per Recipient |
|
|
464 | (1) |
|
9.6.3 One Database Fetch for Each Batch of Recipients |
|
|
465 | (1) |
|
|
466 | (1) |
|
10 Security for SAP NetWeaver BW Data Sources |
|
|
467 | (40) |
|
|
468 | (7) |
|
10.1.1 SAP NetWeaver BW System Parameters |
|
|
468 | (1) |
|
10.1.2 SAP Authentication Principles |
|
|
469 | (1) |
|
10.1.3 Role and User Mapping |
|
|
470 | (1) |
|
10.1.4 Users and Groups Updates |
|
|
471 | (1) |
|
10.1.5 SAP Authentication Options |
|
|
472 | (3) |
|
10.2 Configuring SAP Authentication |
|
|
475 | (7) |
|
10.2.1 Creating a Dedicated SAP NetWeaver BW Account |
|
|
476 | (1) |
|
10.2.2 Registering the SAP System |
|
|
476 | (2) |
|
10.2.3 Defining Authentication Options |
|
|
478 | (1) |
|
|
479 | (1) |
|
10.2.5 Updating Users and Roles |
|
|
480 | (1) |
|
10.2.6 Validating the SAP Authentication Configuration |
|
|
481 | (1) |
|
|
482 | (4) |
|
10.3.1 OLAP Connection Created in Information Design Tool or CMC |
|
|
483 | (1) |
|
10.3.2 Relational Data Federator Data Source Created in Information Design Tool |
|
|
484 | (1) |
|
10.3.3 Relational Connection Created in Universe Design Tool |
|
|
484 | (1) |
|
10.3.4 Authentication Modes |
|
|
485 | (1) |
|
10.4 Creating SAP NetWeaver BW Connections |
|
|
486 | (8) |
|
10.4.1 Creating an OLAP Connection in Information Design Tool |
|
|
486 | (2) |
|
10.4.2 Creating an OLAP Connection in CMC |
|
|
488 | (2) |
|
10.4.3 Creating a Relational Data Federator Data Source in Information Design Tool |
|
|
490 | (2) |
|
10.4.4 Creating a Relational Connection in Universe Design Tool |
|
|
492 | (2) |
|
10.5 SAP Authentication and Single Sign-On |
|
|
494 | (1) |
|
|
495 | (3) |
|
|
495 | (1) |
|
|
496 | (1) |
|
10.6.3 STS and SNC Coexistence |
|
|
497 | (1) |
|
|
498 | (7) |
|
10.7.1 Creating a Keystore File |
|
|
499 | (1) |
|
10.7.2 Creating a Certificate |
|
|
500 | (1) |
|
10.7.3 Importing the Certificate into the SAP NetWeaver BW Server |
|
|
501 | (2) |
|
10.7.4 Importing the Keystore into the CMS Repository |
|
|
503 | (2) |
|
|
505 | (1) |
|
|
505 | (2) |
|
11 Defining and Implementing a Security Model |
|
|
507 | (28) |
|
11.1 General Recommendations |
|
|
507 | (2) |
|
11.2 Defining Users and Groups |
|
|
509 | (2) |
|
11.3 Defining Folders and Objects |
|
|
511 | (1) |
|
|
512 | (2) |
|
11.5 Defining Access Levels |
|
|
514 | (3) |
|
11.6 Mandatory Rights for Common Workflows |
|
|
517 | (4) |
|
11.6.1 Viewing a Web Intelligence Document |
|
|
517 | (1) |
|
11.6.2 Creating a Web Intelligence Document |
|
|
517 | (1) |
|
11.6.3 Saving a Web Intelligence Document |
|
|
518 | (1) |
|
11.6.4 Refreshing a Web Intelligence Document |
|
|
518 | (1) |
|
11.6.5 Editing a Web Intelligence Document |
|
|
519 | (1) |
|
11.6.6 Moving a Category to Another Category |
|
|
519 | (1) |
|
11.6.7 Adding a Document to a Category |
|
|
520 | (1) |
|
11.6.8 Scheduling a Document |
|
|
520 | (1) |
|
11.6.9 Sending a Document to Inbox |
|
|
521 | (1) |
|
11.6.10 Adding a User or a Group to Another Group |
|
|
521 | (1) |
|
11.7 Setting Security for External Groups |
|
|
521 | (1) |
|
11.8 Delegated Administration |
|
|
522 | (3) |
|
11.8.1 Using Rights to Delegate Administration |
|
|
523 | (1) |
|
11.8.2 Restricting CMC Usage |
|
|
524 | (1) |
|
11.9 Defining Database Filtering |
|
|
525 | (2) |
|
11.9.1 Authentication Mode |
|
|
525 | (1) |
|
11.9.2 Connection Overloads |
|
|
526 | (1) |
|
|
527 | (4) |
|
|
527 | (1) |
|
|
527 | (2) |
|
11.10.3 Consistency Between Products |
|
|
529 | (1) |
|
|
530 | (1) |
|
11.10.5 Business Layer Views |
|
|
530 | (1) |
|
11.11 Combined Authentication |
|
|
531 | (2) |
|
11.11.1 Importing SAP NetWeaver BW Users |
|
|
531 | (1) |
|
11.11.2 Single Sign-On with SAP NetWeaver BW and Active Directory |
|
|
532 | (1) |
|
11.12 Testing a Security Model |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
535 | (18) |
|
A Universe Comparison and Conversion |
|
|
535 | (16) |
|
|
551 | (2) |
Index |
|
553 | |