Muutke küpsiste eelistusi

SAP BusinessObjects BI Security: Keep Your BOBJ Safe [Kõva köide]

  • Formaat: Hardback, 562 pages, kõrgus x laius: 229x175 mm
  • Ilmumisaeg: 28-Nov-2012
  • Kirjastus: SAP Press
  • ISBN-10: 1592294375
  • ISBN-13: 9781592294374
  • Kõva köide
  • Hind: 123,36 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 562 pages, kõrgus x laius: 229x175 mm
  • Ilmumisaeg: 28-Nov-2012
  • Kirjastus: SAP Press
  • ISBN-10: 1592294375
  • ISBN-13: 9781592294374
1. Best Practices Unveiled2. Rights Framework3. Specific Rights4. Universe Security5. SAP NetWeaver BW, LDAP, and Active DirectoryHighlights Include:

"Don't talk to strangers"—if only data security policies were this easy. Learn to keep your SAP BusinessObjects Business Intelligence data truly safe from unauthorized actions with this comprehensive guide. Begin with security basics and work your way to advanced concepts; along the way, you’ll explore functional and data security, define a rights model, and secure data sources and universes. Step-by-step instructions ensure that you can implement important security techniques in your administration and design work. This book puts the master key to data security in your hands.

1. Best Practices UnveiledImplement a security system that is easy to understand, use, and enhance by using basic workflows.

2. Rights FrameworkPut the rights framework to work for you using group and folder inheritance and custom access levels.

3. Specific RightsExplore the specific rights of system and content objects stored in the CMS repository, as well as BI 4.0 suite applications.

4. Universe SecurityCompare security features of universes created with Universe Design Tool side by side with its successor, Information Design Tool.

5. SAP NetWeaver BW, LDAP, and Active DirectoryLearn how to secure your SAP BusinessObjects BI 4.0 system using external authentication systems and data sources.

Highlights Include:

  • SAP NetWeaver BW, LDAP, and Active Directory authentication
  • Single sign-on
  • Rights framework and inheritance model
  • Access levels
  • General and specific rights
  • Secured connections
  • Universe security
  • Access restriction
  • Data and business security profile
  • Scheduling, publications, and personalization profile

Acknowledgments 21(2)
1 Introduction to Security in SAP BusinessObjects Business Intelligence 4.0
23(10)
1.1 Business Intelligence Overview
23(1)
1.2 System Security Considerations
24(2)
1.3 A Brief History of Business Objects
26(1)
1.4 SAP BusinessObjects Business Intelligence 4.0 Review
27(2)
1.5 Book Roadmap
29(4)
2 Administration and Security
33(34)
2.1 BI 4.0 Deployment
34(2)
2.2 BI 4.0 Installation
36(8)
2.2.1 Components Installed with BI 4.0 Server Installer
36(3)
2.2.2 BI 4.0 Server Installation Workflow
39(4)
2.2.3 BI Platform Client Tools
43(1)
2.2.4 Other BI 4.0 Suite Installers
44(1)
2.3 Administration Tools
44(3)
2.3.1 Central Configuration Manager (CCM)
45(1)
2.3.2 Central Management Console (CMC)
46(1)
2.4 CMS Repository and File Repository Server
47(6)
2.4.1 InfoObjects and Physical Files
47(1)
2.4.2 InfoObject Structure
48(3)
2.4.3 CMS Database Structure
51(1)
2.4.4 FRS File System
52(1)
2.5 Cryptography
53(5)
2.5.1 Cluster Key
53(2)
2.5.2 Cryptographic Key
55(3)
2.6 BI 4.0 Servers
58(4)
2.6.1 Adaptive Job Server
60(1)
2.6.2 Adaptive Processing Server
61(1)
2.7 Auditing
62(3)
2.7.1 Auditing Database
63(2)
2.7.2 CMC Auditing Tab
65(1)
2.8 Summary
65(2)
3 Users and Authentication
67(78)
3.1 User Authentication
68(5)
3.1.1 Enterprise
69(1)
3.1.2 Standalone
70(1)
3.1.3 LDAP
70(2)
3.1.4 Active Directory
72(1)
3.1.5 Enabling Authentication Selection for BI Launch Pad
72(1)
3.2 Enterprise Users and Groups
73(7)
3.2.1 User Parameters
73(2)
3.2.2 User Personal Folders
75(1)
3.2.3 Groups Structure
76(1)
3.2.4 Predefined Users
77(1)
3.2.5 Predefined Groups
78(1)
3.2.6 Deleting Users and Groups
79(1)
3.3 Managing Users and Groups in the CMC
80(14)
3.3.1 Viewing Users and Groups
80(1)
3.3.2 Creating Enterprise Users
81(1)
3.3.3 Creating Enterprise Groups
82(1)
3.3.4 Creating Users and Groups from CSV File
82(3)
3.3.5 Editing User Parameters
85(1)
3.3.6 Enabling/Disabling Users
85(1)
3.3.7 Adding Users and Groups to Groups
86(1)
3.3.8 Removing Users or Groups From Groups
87(1)
3.3.9 Deleting Users
88(1)
3.3.10 Deleting Groups
88(1)
3.3.11 Account Manager
89(2)
3.3.12 Defining BI Launch Pad Preferences
91(2)
3.3.13 Setting Enterprise Parameters
93(1)
3.4 Trusted Authentication
94(5)
3.4.1 Sharing Shared Secret Key
95(1)
3.4.2 Passing Shared Secret
95(1)
3.4.3 Passing User Name
96(3)
3.5 Aliases and External Authentications
99(7)
3.5.1 Aliases
100(1)
3.5.2 Mapping Users from External Sources
101(3)
3.5.3 Mapped Groups
104(1)
3.5.4 Updating Groups and Users
104(2)
3.5.5 Scheduling Groups and Users Update
106(1)
3.6 Managing Aliases in the CMC
106(5)
3.6.1 Creating an Alias
107(1)
3.6.2 Assigning an Alias
108(1)
3.6.3 Reassigning an Alias
109(1)
3.6.4 Enabling/Disabling an Alias
110(1)
3.6.5 Deleting an Alias
111(1)
3.7 Managing LDAP Authentication in the CMC
111(10)
3.7.1 Configuring LDAP Parameters
111(8)
3.7.2 Editing LDAP Authentication Parameters
119(2)
3.8 Managing Active Directory Authentication
121(21)
3.8.1 Creating Dedicated Active Directory Accounts
122(3)
3.8.2 Starting BI 4.0 with Dedicated Account
125(3)
3.8.3 Configuring AD Authentication into a BI 4.0 System
128(3)
3.8.4 Configuring BI 4.0 with Kerberos
131(1)
3.8.5 Creating krb5.ini
132(1)
3.8.6 Creating bscLogin.conf
133(1)
3.8.7 Modifying the Java Options for Kerberos
133(2)
3.8.8 Creating a Keytab File
135(2)
3.8.9 Increasing Header Size
137(1)
3.8.10 Configuring Web Applications
138(1)
3.8.11 Configuring Browsers
139(2)
3.8.12 Editing Active Directory Configuration
141(1)
3.9 Summary
142(3)
4 Rights Framework
145(42)
4.1 Assigned Rights
145(1)
4.2 General and Specific Rights
146(2)
4.3 Inheritance
148(7)
4.3.1 Group Inheritance
149(1)
4.3.2 Folder Inheritance
150(2)
4.3.3 General and Type-Specific Rights
152(1)
4.3.4 Scope of Rights
153(1)
4.3.5 Breaking Inheritance and Overriding Rights
154(1)
4.4 Non-Owner and Owner Versions of Rights
155(2)
4.5 Objects General Rights
157(6)
4.5.1 General Rights in Detail
159(3)
4.5.2 General Rights Related to Scheduling
162(1)
4.6 Application General Rights
163(2)
4.7 Managing Rights in the CMC
165(6)
4.7.1 Viewing Rights
165(3)
4.7.2 Assigning Advanced Rights
168(3)
4.7.3 Assigning Advanced Rights to a Top-Root Folder
171(1)
4.7.4 Unassigning Advanced Rights
171(1)
4.8 Access Levels
171(4)
4.8.1 Predefined Access Levels
172(1)
4.8.2 Custom Access Levels
173(1)
4.8.3 Aggregation
174(1)
4.9 Managing Access Level in the CMC
175(6)
4.9.1 Creating an Access Level
175(1)
4.9.2 Setting Access Level Rights
176(2)
4.9.3 Copying an Access Level
178(1)
4.9.4 Renaming an Access Level
178(1)
4.9.5 Assigning an Access Level to an Object
179(1)
4.9.6 Deleting an Access Level
180(1)
4.10 Running Administration Queries in the CMC
181(4)
4.10.1 Running a Security Query
181(3)
4.10.2 Running a Relationship Query
184(1)
4.11 Summary
185(2)
5 Applications and Rights Reference
187(100)
5.1 Applications List
188(6)
5.2 System Objects List
194(2)
5.3 Content Object List
196(3)
5.4 Analysis, Edition for OLAP
199(1)
5.4.1 Analysis, Edition for OLAP Rights
199(1)
5.4.2 Analysis View and Analysis Workspace Rights
200(1)
5.5 BEx Web Applications
200(1)
5.6 BI Launch Pad
200(2)
5.7 Widgets
202(1)
5.8 BI Workspaces
203(3)
5.8.1 BI Workspaces Rights
203(2)
5.8.2 BI Workspace Rights
205(1)
5.8.3 Module Rights
206(1)
5.9 Central Management Console
206(1)
5.10 SAP Crystal Reports
207(2)
5.10.1 Crystal Reports Configuration Rights
208(1)
5.10.2 Crystal Reports Document Rights
208(1)
5.11 Explorer
209(12)
5.11.1 Explorer Overview
210(1)
5.11.2 Information Space Security
211(3)
5.11.3 Explorer Rights
214(7)
5.11.4 Information Space Rights
221(1)
5.11.5 Exploration View Set Rights
221(1)
5.12 Information Design Tool
221(7)
5.12.1 Information Design Tool Rights
222(3)
5.12.2 Universe Rights
225(3)
5.13 Promotion Management
228(8)
5.13.1 Promoting Security
229(1)
5.13.2 Promotion Management Rights
230(6)
5.14 SAP BusinessObjects Mobile
236(1)
5.15 SAP StreamWork
237(1)
5.16 Universe Design Tool
238(6)
5.16.1 Universe Design Tool Rights
238(3)
5.16.2 Universe Rights
241(3)
5.17 Version Management
244(5)
5.18 Visual Difference
249(1)
5.19 Web Intelligence
250(27)
5.19.1 Deployment Options
251(2)
5.19.2 Offline Mode
253(1)
5.19.3 Purge and Refresh on Open
254(2)
5.19.4 Web Intelligence Rights
256(15)
5.19.5 Web Intelligence Documents Rights
271(6)
5.20 Users and Groups
277(2)
5.21 Connections
279(4)
5.21.1 Relational Connection Rights
280(2)
5.21.2 OLAP Connection Rights
282(1)
5.21.3 Data Federator Data Source Rights
282(1)
5.21.4 Connection Rights
282(1)
5.22 Note Rights
283(1)
5.23 Schedule Output Format
284(1)
5.24 Summary
285(2)
6 Connections and Database Authentications
287(30)
6.1 Secured Connections
288(5)
6.1.1 Relational Connections
288(1)
6.1.2 Data Federator Data Sources
289(1)
6.1.3 OLAP Connections (Universe Design Tool)
290(1)
6.1.4 OLAP Connections (Information Design Tool/CMC)
290(1)
6.1.5 Relational Connections (Business View Manager)
291(1)
6.1.6 Product Consumptions
292(1)
6.2 Local Connections
293(2)
6.2.1 Information Design Tool
293(1)
6.2.2 Universe Design Tool
294(1)
6.3 Connection Authentication Mode
295(6)
6.3.1 Fixed Credentials
296(1)
6.3.2 Credentials Mapping
297(2)
6.3.3 Prompted Authentication
299(1)
6.3.4 Single Sign-On
300(1)
6.4 Using Credentials Mapping for Single Sign-On
301(2)
6.5 Managing Connections
303(11)
6.5.1 Managing Connections in Information Design Tool
303(6)
6.5.2 Managing Connections in Universe Design Tool
309(3)
6.5.3 Managing Connections in the CMC
312(2)
6.6 Summary
314(3)
7 Universe Security in Universe Design Tool
317(44)
7.1 Universe
318(5)
7.1.1 Relational Universe
320(1)
7.1.2 OLAP Universe
320(2)
7.1.3 Universe Security
322(1)
7.1.4 @VARIABLE
323(1)
7.2 Using Filters on Table, Object, Class, or Universe
323(2)
7.2.1 Table Auto-join
324(1)
7.2.2 Object Filters
325(1)
7.2.3 Mandatory Filters
325(1)
7.3 Using Filters in Universe Design Tool
325(5)
7.3.1 Defining an Auto-join
326(1)
7.3.2 Defining a WHERE Clause on an Object
327(1)
7.3.3 Defining a Mandatory Filter
328(1)
7.3.4 Exporting a Universe in a CMS Repository
329(1)
7.4 Access Restriction Definition
330(7)
7.4.1 Connection
331(1)
7.4.2 Controls
332(1)
7.4.3 SQL
333(1)
7.4.4 Objects
334(1)
7.4.5 Rows
335(1)
7.4.6 Table Mapping
336(1)
7.5 Access Restriction Aggregation
337(2)
7.5.1 Connection, SQL, Controls, and Table Mapping
337(1)
7.5.2 Objects
337(1)
7.5.3 Row Restriction
338(1)
7.6 Managing Access Restrictions in Universe Design Tool
339(15)
7.6.1 Opening the Manage Access Restrictions Dialog Box
339(1)
7.6.2 Creating and Editing Access Restrictions
340(7)
7.6.3 Assigning Access Restrictions
347(1)
7.6.4 Un-Assigning Access Restrictions
348(1)
7.6.5 Defining Group Priority for Access Restrictions
348(1)
7.6.6 Setting Row Restriction Aggregation
349(1)
7.6.7 Preview Net Results
350(2)
7.6.8 Deleting Access Restrictions
352(1)
7.6.9 Setting AUTO_UPDATE_QUERY Parameter
353(1)
7.7 Object Access Level
354(1)
7.8 Managing Object Access Levels
355(4)
7.8.1 Defining Object Access Levels in Universe Design Tool
356(1)
7.8.2 Defining User Access Levels in CMC
357(1)
7.8.3 Editing User Access Levels in CMC
358(1)
7.8.4 Removing User Access Levels in CMC
358(1)
7.9 Summary
359(2)
8 Universe Security in Information Design Tool
361(82)
8.1 Introduction to New Universe
362(4)
8.1.1 Data Foundation
362(1)
8.1.2 Business Layer
363(2)
8.1.3 Security Model
365(1)
8.2 Defining WHERE Clauses and Filters in Information Design Tool
366(4)
8.2.1 Defining an Auto-join in Information Design Tool
367(1)
8.2.2 Defining a WHERE Clause on an Object
367(1)
8.2.3 Defining a Mandatory Filter
368(1)
8.2.4 Publishing a Universe in CMS Repository
369(1)
8.3 Security Profiles
370(5)
8.3.1 Assigned Users and Groups
371(1)
8.3.2 Aggregations
372(1)
8.3.3 AND, ANDOR, and OR Aggregation
373(2)
8.3.4 Consumption
375(1)
8.4 Data Security Profiles
375(7)
8.4.1 Connections
376(1)
8.4.2 Controls
377(1)
8.4.3 SQL
378(2)
8.4.4 Rows
380(1)
8.4.5 Tables
381(1)
8.5 Business Security Profiles
382(13)
8.5.1 Create Query
383(4)
8.5.2 Display Data
387(3)
8.5.3 Filters (Relational Universe)
390(2)
8.5.4 Filters (Multidimensional Universe)
392(3)
8.6 Managing Security Profiles in Information Design Tool
395(36)
8.6.1 Opening the Security Editor
396(2)
8.6.2 Switching Universe-Centric View and User-Centric View
398(2)
8.6.3 Creating a Data Security Profile
400(8)
8.6.4 Editing a Data Security Profile
408(1)
8.6.5 Creating a Business Security Profile
408(13)
8.6.6 Editing a Business Security Profile
421(1)
8.6.7 Assigning and Unassigning a Security Profile
422(2)
8.6.8 Show Universes with Assigned Security Profiles
424(1)
8.6.9 Setting Aggregation Options
424(1)
8.6.10 Setting Data Security Profile Priorities
425(2)
8.6.11 Deleting Security Profiles
427(1)
8.6.12 Show Inherited Security Profiles
428(1)
8.6.13 Preview Net Result
429(1)
8.6.14 Check Integrity
430(1)
8.7 Object Access Level
431(3)
8.7.1 Object Access Level Overview
431(1)
8.7.2 User Access Level
432(1)
8.7.3 Defining Object Access Level in Information Design Tool
433(1)
8.8 User Attributes
434(2)
8.8.1 Defining User Attributes
434(1)
8.8.2 Using User Attributes
434(1)
8.8.3 User Attributes Substitution
435(1)
8.9 Managing User Attributes in the CMC
436(3)
8.9.1 Defining User Attributes in the CMC
436(2)
8.9.2 Setting User Attributes Value in the CMC
438(1)
8.9.3 Deleting User Attributes in the CMC
439(1)
8.10 Running a Secured Query
439(2)
8.11 Summary
441(2)
9 Scheduling and Publishing
443(24)
9.1 Scheduling and Publishing Framework
444(1)
9.1.1 Support for Schedule and Publication
444(1)
9.1.2 Refresh During Schedule or Publication
444(1)
9.2 Scheduling
445(4)
9.2.1 Scheduling Parameters
445(2)
9.2.2 Schedule For Option
447(2)
9.3 Publishing
449(3)
9.3.1 Publishing vs. Scheduling
449(1)
9.3.2 Publication Parameters
450(2)
9.4 Publication Recipients
452(4)
9.4.1 Dynamic Recipient Document
452(1)
9.4.2 Add Dynamic Recipients to a Publication
453(2)
9.4.3 Subscription and Unsubscription to a Publication
455(1)
9.5 Publication Personalization and Profile
456(7)
9.5.1 Global Profile
456(1)
9.5.2 Local Profile
457(1)
9.5.3 Creating a Global Profile
458(3)
9.5.4 Setting Profiles to a Publication
461(2)
9.6 Report Bursting Options
463(3)
9.6.1 One Database Fetch for All Recipients
463(1)
9.6.2 One Database Fetch per Recipient
464(1)
9.6.3 One Database Fetch for Each Batch of Recipients
465(1)
9.7 Summary
466(1)
10 Security for SAP NetWeaver BW Data Sources
467(40)
10.1 SAP Authentication
468(7)
10.1.1 SAP NetWeaver BW System Parameters
468(1)
10.1.2 SAP Authentication Principles
469(1)
10.1.3 Role and User Mapping
470(1)
10.1.4 Users and Groups Updates
471(1)
10.1.5 SAP Authentication Options
472(3)
10.2 Configuring SAP Authentication
475(7)
10.2.1 Creating a Dedicated SAP NetWeaver BW Account
476(1)
10.2.2 Registering the SAP System
476(2)
10.2.3 Defining Authentication Options
478(1)
10.2.4 Importing Roles
479(1)
10.2.5 Updating Users and Roles
480(1)
10.2.6 Validating the SAP Authentication Configuration
481(1)
10.3 SAP Connections
482(4)
10.3.1 OLAP Connection Created in Information Design Tool or CMC
483(1)
10.3.2 Relational Data Federator Data Source Created in Information Design Tool
484(1)
10.3.3 Relational Connection Created in Universe Design Tool
484(1)
10.3.4 Authentication Modes
485(1)
10.4 Creating SAP NetWeaver BW Connections
486(8)
10.4.1 Creating an OLAP Connection in Information Design Tool
486(2)
10.4.2 Creating an OLAP Connection in CMC
488(2)
10.4.3 Creating a Relational Data Federator Data Source in Information Design Tool
490(2)
10.4.4 Creating a Relational Connection in Universe Design Tool
492(2)
10.5 SAP Authentication and Single Sign-On
494(1)
10.6 SNC and STS
495(3)
10.6.1 Principles
495(1)
10.6.2 Workflows
496(1)
10.6.3 STS and SNC Coexistence
497(1)
10.7 Configuring STS
498(7)
10.7.1 Creating a Keystore File
499(1)
10.7.2 Creating a Certificate
500(1)
10.7.3 Importing the Certificate into the SAP NetWeaver BW Server
501(2)
10.7.4 Importing the Keystore into the CMS Repository
503(2)
10.8 User Attributes
505(1)
10.9 Summary
505(2)
11 Defining and Implementing a Security Model
507(28)
11.1 General Recommendations
507(2)
11.2 Defining Users and Groups
509(2)
11.3 Defining Folders and Objects
511(1)
11.4 Defining Rights
512(2)
11.5 Defining Access Levels
514(3)
11.6 Mandatory Rights for Common Workflows
517(4)
11.6.1 Viewing a Web Intelligence Document
517(1)
11.6.2 Creating a Web Intelligence Document
517(1)
11.6.3 Saving a Web Intelligence Document
518(1)
11.6.4 Refreshing a Web Intelligence Document
518(1)
11.6.5 Editing a Web Intelligence Document
519(1)
11.6.6 Moving a Category to Another Category
519(1)
11.6.7 Adding a Document to a Category
520(1)
11.6.8 Scheduling a Document
520(1)
11.6.9 Sending a Document to Inbox
521(1)
11.6.10 Adding a User or a Group to Another Group
521(1)
11.7 Setting Security for External Groups
521(1)
11.8 Delegated Administration
522(3)
11.8.1 Using Rights to Delegate Administration
523(1)
11.8.2 Restricting CMC Usage
524(1)
11.9 Defining Database Filtering
525(2)
11.9.1 Authentication Mode
525(1)
11.9.2 Connection Overloads
526(1)
11.10 Universe Security
527(4)
11.10.1 Universe Scope
527(1)
11.10.2 Row Filtering
527(2)
11.10.3 Consistency Between Products
529(1)
11.10.4 User Attributes
530(1)
11.10.5 Business Layer Views
530(1)
11.11 Combined Authentication
531(2)
11.11.1 Importing SAP NetWeaver BW Users
531(1)
11.11.2 Single Sign-On with SAP NetWeaver BW and Active Directory
532(1)
11.12 Testing a Security Model
533(1)
11.13 Summary
534(1)
Appendices
535(18)
A Universe Comparison and Conversion
535(16)
B The Authors
551(2)
Index 553
Christian Ah-Soon has worked for SAP BusinessObjects for 13 years as a program manager on areas like administration, security, internationalization, and installation. Christian holds a Ph.D. in computer science and graduated from TELECOM Nancy.

David François Gonzalez is an SAP BusinessObjects product expert engineer with the research and development group based in France. David has worked for SAP BusinessObjects for 13 years, starting with the BusinessObjects V5 and the Supervisor product and later managing a team in charge of BusinessObjects V6 suite testing. David shifted to customer contact with XI R2 and XI 3.1, where he was in charge of customer environment replication. Four years ago, he started working very close to both the field and the customers, providing best practices and white papers on internal and external websites. Since then, he has participated in conferences such as Utilisateurs SAP Francophones and TechEd, and he regularly helps customers troubleshoot site problems and implement SAP BusinessObjects solutions.