Académique Documents
Professionnel Documents
Culture Documents
x security
concepts
Group structure is no longer a classic tree like under legacy BO. A group can
belong to more than one group. A kind of acyclic graph:
A user can belong to more than one group (the Everyone group, a technical group
and a functional one)
Closed system
Inherited right
OK
KO
Xir2
Object
OK Specified
KO
Note: NSKO
means Not
s
OK+N
S
KO+N
S
OK+K
O
OK
KO
KO
NS can be largely used because it does not have any effect on effective rights
calculation. Used with OK or KO , it is transparent
Net result:
Schedule documents not allowed except
Deski documents
OK
KO
Xi 3.x
Object
KO
OK
KO
Note:
s NS means Not specified
OK+N
S
KO+N
S
OK+K
O
OK
KO
KO
Xi security
implementation/migration:
Challenges
BOE Xi 3.x security model is powerful
Understand the new security concepts
- Take advantage of them
- Redesign your security model
Challenges of security migration or implementation:
Challenge 1:
Manage the repository post migration or post implementation, whilst limiting
administration tasks and by offering an optimum quality of service to end-users
Challenge 2:
Implement and Document your Xi security
Load all your SAP BusinessObjects data (CMS, universes, documents and audit
data) within a datawarehouse
Query and analyze this data using pre built BO universes and Webi reports
Document your deployment:
- Detect unused documents and universes, dormant users
- Perform impact analysis
Contact
REQUEST A DEMO!
Sbastien GOIFFON
+1 (347) 767 6836
contact@gbandsmith.com
www.gbandsmith.com