Professional Documents
Culture Documents
[ Learning Points
Introduction to BI Security.
Tools for Administering BI Security.
Effectiveness of BI Security and Analysis Authorizations.
Real Industry Examples.
Tips throughout.
[ Introduction to BI Security
BI is an Online Analytical Processing (OLAP) environment
versus a traditional Online Transaction Processing
(OLTP) environment like ECC.
Access is controlled by a users data need rather than by
a discreet business process.
This means that we can allow users to run the same
query and only the appropriate data is presented to the
user.
OLTP (ECC)
OLAP (BI)
Source of Data
Purpose of Data
Business Tasks
Usually Small
Type of Data
Detailed
Summary
Timeliness of Data
Must be Current
Updates to Data
Frequently
Database Design
Number of
transaction/users
Few
Response Time
Quick
Reasonable/Slow
Queries
Standard/Simple queries
Complex/Aggregations
Database
Operations
Read
Type of Processing
Well-Defined
Ad hoc
Impact on security
Real Experience. Real Advantage.
Reporting Authorizations
Granted through Standard Authorizations
Limitations
Analysis Authorizations
As of Netweaver 2004
Allows reporting and analysis in BI
5
PFCG
10
11
12
13
14
15
16
17
18
19
20
21
InfoCube
Characteristic
Characteristic Value
Key Figure
Hierarchy Nodes
22
I
E
EQ
BT
LE
GT
GE
Grant Authorization
Deny Authorization
Exactly one date
Range of dates
Everything value in FROM Field
Everything > value in FROM Field
Everything value in FROM Field
Less Than
Pattern
All
LT
CP
*
Aggregated Data
23
24
25
(0TCAIPROV)
(ZSOLDTO__ZSALESEMP)
26
27
All or Nothing
Query
Selection
Authorizations
Query
Selection
Authorizations
29
30
In Sum
There are many ways to control the flow of data to users in
a BI system.
Fully utilizing the security tool available in a BI system can
be VERY effective for any organization.
31
32
33
34
35
36
37
[ Return on Investment
To maximize the ROI in your BI system it
has to be fully utilized.
Managers can work with BI developers,
admins and query owners to develop the
most appropriate security solution for their
particular BI environment.
With a good security solution in place,
Managers can feel confident granting
access to the BI system.
38
[ Best Practices
Design and use your SAP BI environment the way SAP
intended by architecting an appropriate and best practice
security solution.
39
[ Key Learnings
You now, (if you didnt before)
understand the difference between OLAP vs OLTP systems
are familiar with the basic BI security tools
see that you can effectively secure your BI environment
while maximizing user access
have benefited from an actual industry example
40
SESSION CODE:
1008
41