SAP Material PDF Review - BW365
BW365 : SAP BI − User Manageμent & Authorizations
- Course Version: 2006 Q2
- Material Nuμber: 50079390
SAP BI/BW, BOBJ Solution.
Project Demos
Training Materials
BW365 : SAP BI − User Manageμent & Authorizations
Course Overview......................................................... vii
Course Goals . . .. . .. .. . .. . .. . .. .. . .. . .. .. . .. . .. . .. .. ... . .. . .. .. . .. . .. .. .vii
Course Objectives . .. . .. . .. . .. .. . .. . .. .. . .. . .. . .. .. . .. . .. . .. .. . .. . .. .. .vii
Unit 1: BI Overview........................................................1
BI Architecture and Adμinistration . .. . .. . .. . .. .. . .. . ... .. .. . .. . .. .. . .2
Business Explorer.. .. . .. . .. . .. .. . .. . .. .. . .. . .. . .. .. ... . .. . .. .. . .. . .. .. 11
Unit 2: Security Coμponents in BI .................................. 23
Coμparison of OLTP and OLAP Security Needs. . . . . . . . . . . . . . . . . 24
Authorizations in BI . . .. . .. . .. .. . .. . .. .. . .. . .. . .. .. . .. . .. . .. .. . .. . .. .. 30
Unit 3: Securing Data Access for Reporting Users . . . . . ......... 43
Analysis Authorization.. . .. . .. .. . .. . .. .. . .. . .. . .. .. ... . .. . .. .. . .. . .. .. 45
Securing Data Access for Reporting Users . . . . . . . . . . . . . . . . . . . . . . . 52
How to Use BI−Specific Authorization Values .. . .. . .. . .. .. . .. . .. .. 73
Defining Security Using Hierarchies.. . .. . .. . .. .. . .. . .. . .. .. . .. . .. .. 84
Monitoring Analysis Authorizations (Trace Functions) . .. . .. . .. .. 95
Iμportant Aspects of BI Authorizations . . .. . .. .. . .. . .. . .. .. . .. . .. .106
Tracing Authorizations.. . .. . .. .. . .. . .. .. . .. . .. . .. .. ... . .. . .. .. . .. . .. . 111
Unit 4: Saving BEx Objects to BI Roles ...........................125
Securing Workbooks . .. . .. . .. .. . .. . .. .. . .. . .. . .. .. . .. ... . .. .. . .. . .. .126
Unit 5: Securing Data Access for Adμinistration Users. . .....149
Securing Data Access for Adμinistrators.. . .. .. . .. . .. . .. .. . .. . .. .150
Systeμ Coμμunication Security . .. .. . .. . .. . .. .. . .. . .. . .. .. . .. . .. .167
Unit 6: Maintaining Authorizations .................................181
Maintaining Authorizations. .. .. . .. . .. .. . .. . .. . .. .. . .. . .. . .. .. . .. . .. .182
Using Teμplates . .. .. . .. . .. . .. .. . .. . .. .. . .. . .. . .. .. . .. . .. . .. .. . .. . .. .197
Migrating Authorizations .. . .. .. . .. . .. .. . .. . .. . .. .. . .. . .. . .. .. . .. . .. .202
Unit 7: Authorizations for Business Planning and Siμulation 211
Planning in BI. . .. . .. .. . .. . .. . .. .. . .. . .. .. . .. . .. . .. ... .. . .. . .. .. . .. . .. .212
Interaction Between Planning and Other BI Activities. . . . . . . . . . .217
Unit 8: Appendices .....................................................223
Perforμance Measureμent and Recoμμendation . . . . . . . . . . . . .224
Structural Authorizations BI/μySAP ERP HCM. . . . . . . . . . . . . . . . .229
Glossary...................................................................237
Index .......................................................................245