Designing security model is one among the important phase in BusinessObjects implementation/migration projects. Well-organized security model not only provides easier Administration but also ensures security is seamlessly implemented across different functional/application user groups with less maintenance effort.
From this blog on wards, we are going to see how to design and implement the security model. Before starting the design, we should consider the below things
Various rights categories (as on BI 4.0 SP3)
There are 4 different rights categories as we already aware and they listed below
I have consolidated all of them and the same is depicted below
Various user categories
Always categorize users based on Application as well as functionality (what they can do). I have categorized users based on their BusinessObjects Application/content and their functionality on BI content
Application wise user category
User category | Description |
Crystal users | Crystal report users |
WebI users | Web Intelligence report users |
Dashboard users | Xcelcius dashboard users |
Design Studio Users | Design Studio dashboard users |
Universe/Information designers | Universe Designers |
Analysis users | Analysis Application users |
Explorer users | Explorer application users |
Mobile users | Mobile report users |
Functional user category
User category | Description |
BOE Users | All users of the BusinessObjects system |
Viewers | Users who can only view/refresh the reports |
Interactive Analysts | Analysts can refresh/create/modify the reports that they create and they cannot create/modify the corporate reports |
Interactive Authors | Analysts can refresh/create/modify the corporate reports |
Super Users/Managers | Users who can manage and maintain document as well as users for a particular application/department |
Content Schedulers | Users who can schedule reports for their own and on behalf of others |
Content Promoters | Users who can migrate/promote BI content across different environments |
Delegated administrators | Users who can administrate the Businessobjects deployment as a whole or part of it |
Based on the rights and user categorizations we are going to see more about the security model design in my upcoming blogs! Thanks for reading!
Related blogs
BusinessObjects Administration - Setting up security model – Part II
BusinessObjects Administration - Setting up security model – Part III
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
36 | |
7 | |
5 | |
5 | |
5 | |
4 | |
4 | |
4 | |
3 | |
3 |