49
SAP BusinessObjects Security Essentials Dallas Marks SAP Inside Track St. Louis July 15, 2011

Sap inside track_2011_marks_sap_business_objects_security

Embed Size (px)

Citation preview

Page 1: Sap inside track_2011_marks_sap_business_objects_security

SAP BusinessObjectsSecurity EssentialsDallas Marks

SAP Inside Track – St. Louis

July 15, 2011

Page 2: Sap inside track_2011_marks_sap_business_objects_security

]

STEPHANIE CLUNE[ASUG INSTALLATION MEMBER

MEMBER SINCE: 2004

PHIL AWTRY[ASUG INSTALLATION MEMBER

MEMBER SINCE: 1999

MIKE NARDUCCI[ASUG ASSOCIATE MEMBER

MEMBER SINCE: 1998

SAP BusinessObjects Security

EssentialsDallas Marks

Session 409

Page 3: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Breakout Description

In this presentation, learn how the SAP BusinessObjects

security model works. Leverage features, such as

inheritance, scope of rights, and custom access levels, to

secure the business intelligence system, while reducing

overall complexity and maintenance. Techniques will be

demonstrated using SAP BusinessObjects XI that are also

applicable to SAP BusinessObjects Edge BI. Real-world

scenarios drive home the concepts learned and give each

attendee the confidence to implement the same techniques

back home.

3

Page 4: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ About Dallas Marks

Dallas Marks is a Senior Architect and Trainer at Kalvin Consulting, an SAP

Services Partner focusing on business intelligence, business analytics and

data warehousing. Kalvin is also a SAP BusinessObjects Authorized

Education Provider, providing on-site education services at client locations

throughout North America.

Dallas is an SAP Certified Application Associate and authorized trainer for

Web Intelligence, Universe Design, Xcelsius, and SAP BusinessObjects

Enterprise administration. A seasoned consultant and speaker, Dallas has

worked with SAP BusinessObjects tools since 2003 and presented at the

North American conference each year since 2006.

Dallas has implemented SAP BusinessObjects solutions for a number of

industries, including energy, health care, and manufacturing. He holds a

master’s degree in Computer Engineering from the University of Cincinnati.

Dallas blogs about various business intelligence topics at

http://www.dallasmarks.org/.

4

Page 5: Sap inside track_2011_marks_sap_business_objects_security

About Kalvin Consulting

Mission

• To be a world class consulting company by delivering innovative solutions and extraordinary service

Our Values

• Kalvin’s Success: Every customer is a successful customer

• Kalvin’s Service: We value your time, we will get it right

Expertise spans across all areas of BI

• “Best of Breed” solution provider for Business Intelligence, Business Analytics, and Data Warehousing

• Solution Blueprints, Roadmaps & Architecture

• Installation, Configuration & Customization

• Cross Platform & Cross Product Migrations

• Reporting, dashboards & guided analysis

• Cutting edge customization

Page 6: Sap inside track_2011_marks_sap_business_objects_security

About Kalvin’s Staff

Corporate Office – Mason, Ohio

• Dedicated sales, marketing, HR & administration staff

• Dedicated support staff with lab and training center

Virtual Offices – 25 Consultants

• Greater Cincinnati, Dayton, Chicago, Atlanta & Boston

• Strive to maintain 10% availability

• Extensive network of independent consultants

• Non-billable Delivery Manager to oversee the project deliverables and ensure client expectations are met

Page 7: Sap inside track_2011_marks_sap_business_objects_security

The Kalvin Difference

Dedicated Team

• Dedicated team of Kalvin employees. Kalvin is NOT a staffing company

• Kalvin holds bi-weekly information sharing sessions and quarterly company events for our employees to stay connected and learn from each other. We had our first KalvinFest, in August 2009

Expertise

• Kalvin is an end to end solutions provider from data integration, reporting, dashboard and visualization

• Our dedicated team of consultants bring together a full range of technical expertise in all Business Intelligence and Data Integration products:SAP BI - BusinessObjects, IBM, Oracle, Microsoft BI and customization techniques using Java and .NET

Partnerships

• Kalvin believes each client is unique and works to build a long-term partnership

Page 8: Sap inside track_2011_marks_sap_business_objects_security

Kalvin’s BI Methodology

Reporting Ad-hoc

AnalysisDashboards

Data warehouseand cubes

Data miningData

enhancementMaster Data Management

Making BI Successful

Page 9: Sap inside track_2011_marks_sap_business_objects_security

Kalvin’s Best Practices

Adopt the best from the industry

Follow the best of BI standards

Deploy the processes, policies and framework

Create a repository of information for learning and training

Share ideas and experiences by participating in User Groups & Conferences

Page 10: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Poll

By a show of hands, are you using:

SAP Applications?

SAP BusinessObjects?

SAP BusinessObjects Business Intelligence 4.0 (ramp-

up)?

Page 11: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Does Security Setup Make You Angry?

Page 12: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Agenda

SAP BusinessObjects Security Basics

Demonstration

Custom Access Levels, Permissions Explorer and Security Query

Best Practices

Next Steps

Your Questions

Page 13: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

SECURITY BASICS

SAP BusinessObjects Security Essentials

Page 14: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Terminology

Principal – a user or group

Rights override - a rights behavior in

which rights that are set on child objects

override the rights set on parent objects

General Global Rights – access rights

enforced regardless of content type

Content Specific Rights – access rights

unique to content type (Crystal Report,

Web Intelligence, etc)

Page 15: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Predefined Rights

Rights Option Description XI R2 XI 3.x

No Access Unable to access an object yes

slightly

different

View Able to view historical (scheduled) instances of an object yes yes

Schedule Able to schedule instances of an object yes yes

View on Demand Able to view live data on-demand yes yes

Full Control Able to change or delete an object yes yes

Page 16: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Advanced/Granular Rights

Rights Option Description XI R2 XI 3.x

Granted The right is granted to a principal. yes yes

Denied The right is denied to a principal. yes yes

Not Specified

The right is unspecified for a principal. By

default, rights set to Not Specified are denied. yes yes

Apply to Object

The right applies to the object. This option

becomes available when you click Granted or

Denied. no yes

Apply to Sub-Objects

The right applies to sub-objects. This option

becomes available when you click Granted or

Denied. no yes

Page 17: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Folder Inheritance

Global Rights

Object

Object

Object

Object

Top Level Folder

Subfolder

Subfolder

NOTE:

In XI R2, global rights are set on the Rights tab

in the Settings management area.

In XI 3.x, global rights are set in the Folders

management area as “All Folders Security”

Page 18: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Group Inheritance Rules

eFashion Sales Managers 2008

eFashion East eFashion South eFashion West

Barrett Richards Larry Leonard Bennett Steve

Page 19: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Breaking Inheritance

Still possible in XI 3.x as

it was in XI Release 2

Can disable folder

inheritance, group

inheritance, or both

May not be as

necessary in XI 3.x

because of new scope

of rights features

Page 20: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Custom Access Levels

New Management Area in CMC XI 3.x

Can create new access levels or copy

existing access levels

Pre-defined rights (View, Schedule, View

On Demand, Full Control) levels cannot

be altered

Easier to manage than setting Advanced

rights

Page 21: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Scope of Rights

Scope of rights – new in XI 3.x, the ability to limit the

extent of rights inheritance (Apply to Object, Apply to

Sub-object)

In BusinessObjects Enterprise XI R2, the administrator

was forced to break inheritance when they wanted to give

user rights to child folders that were different to those

given to the parent folder

In XI 3.x, rights are effective for both the parent object and

the child objects by default (same as XI R2). However…

Page 22: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Scope of Rights, cont.

With BusinessObjects Enterprise XI 3.x, the administrator can now

specify that a right set on a parent object should apply to that object only.

Page 23: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

DEMONSTRATION

SAP BusinessObjects Security Essentials

Page 24: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Demonstration

Authentication Types

Users and Groups

Custom Access Levels

Permissions Explorer

Security Query

Page 25: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Demonstration - Authentication Types

Enterprise

LDAP

Windows AD

Windows NT

SAP (requires

SAP

Integration Kit

in releases

prior to BI 4.0)

25

Page 26: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Demonstration – Users & Groups

Page 27: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Demonstration – Folders and Content

Page 28: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

DEMONSTRATION – CUSTOM

ACCESS LEVELS

SAP BusinessObjects Security Essentials

Page 29: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Demonstration – Custom Access Levels

Custom Access Level demo…

Page 30: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

PERMISSIONS EXPLORER

AND SECURITY QUERY

SAP BusinessObjects Security Essentials

Page 31: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Permissions Explorer (object centric)

Use the Permissions Explorer to determine the

rights a principal has on an object

Improvement upon Check User Rights button in

XI Release 2. Check User Rights only identified

the effective rights – the source of the rights

assignment was still unknown

Available from any object (folder, document,

universe, connection, etc.) that can have rights

assigned

Page 32: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Permissions Explorer

Permissions Explorer demo…

Page 33: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Security Query (user centric)

Use Security Query to determine the objects to which a

principal has been granted or denied access.

Available from Users and Groups or Query Results

Page 34: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Security Query – Query Principal

Query Principal - the user or group

that you want to run the security query

for. You can specify one principal for

each security query

Page 35: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Security Query – Query Permission

Query Permission - the right or rights

you want to run the security query for,

the status of these rights, and the

object type these rights are set on

Page 36: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Security Query – Query Context

Query Context - the CMC areas that

you want the security query to search.

For each area, you can choose

whether to include sub-objects in the

security query. A security query can

have a maximum of four areas

Security Query demo…

Page 37: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

BEST PRACTICES

SAP BusinessObjects Security Essentials

Page 38: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Security Best Practices - XI R2 or XI 3.x

Grant rights to groups on folders. Although rights can be

granted on individual objects or users, the security model

can become difficult to maintain.

Use pre-defined rights wherever possible. Understand

the additional complexity that advanced rights can

introduce.

Avoid breaking inheritance, while understanding it is

sometimes necessary

Add multiple users to Administrators group rather than

sharing Administrator user account to improve traceability

Document and maintain your security structure outside of

the CMC – MS Excel is a good choice

Page 39: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Security Best Practices - XI 3.x

Allot time in your upgrade/migration for administrative

staff to understand both the new CMC interface/workflows

as well as its new features

Use custom access levels where you would have

previously resorted to advanced rights.

Identify opportunities to limit the scope of rights instead of

breaking inheritance

Take advantage of the Permissions Explorer and Security

Query tools to diagnose and correct security issues

Page 40: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

NEXT STEPS

SAP BusinessObjects Security Essentials

40

Page 41: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Relevant ASUG SBOUC 2010 Breakout Sessions

41

I can CAL, can you?

(Custom Access Levels)Sandra Brotje | Session 0405

Tuesday, October 5, 2010 | 4:00 PM – 5:00 PM

Page 42: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Recommended Reading

SAP BusinessObjects Enterprise Administrator’s Guide

SAP BusinessObjects Enterprise XI 3.0/3.1 Upgrade Guide

SAP BusinessObjects 5/6 to XI 3.1 Migration Guide

42

Visit the SAP Help Portal

at http://help.sap.com to

download these

resources.

Page 43: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[ Relevant Education

SAP BusinessObjects Enterprise XI 3.0/3.1:

Administration and Security2 days - course code BOE310

SAP BusinessObjects Enterprise XI 3.0/3.1:

Administering Servers3 days - course code BOE320

SAP BusinessObjects Enterprise XI 3.0/3.1:

Designing and Deploying a Solution4 days - course code BOE330

43

Official SAP BusinessObjects curriculum is available on-site at

your location or at authorized education centers around the world.

Page 44: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

YOUR QUESTIONS

SAP BusinessObjects Security Essentials

44

Page 45: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

COMPARING XI R2 AND

XI 3.X SECURITY

SAP BusinessObjects Security Essentials

Page 46: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

Users XI R2 XI 3.x

Administrator yes yes

Guest yes yes

QaaWSServletPrincipal no yes

PMUser yes no

Set Administrator password during install? no yes

Guest user disabled by default? no yes

Groups XI R2 XI 3.x

Administrators yes yes

Everyone yes yes

QaaWS Group Designer no yes

Report Conversion Tool Users yes yes

BusinessObjects NT Users yes no

Universe Designer users yes yes

Translators no yes

Default Users and Groups

Page 47: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

Feature XI R2 XI 3.x

Folder Inheritance yes yes

Group Inheritance yes yes

Predefined Access Levels yes yes

No Access yes yes*

View yes yes

Schedule yes yes

View On Demand yes yes

Full Control yes yes

Advanced Rights yes yes

Custom Access Levels no yes

Break Inheritance yes yes

Scope of Rights no yes

Combined Access Levels no yes

Security Features

Page 48: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

Application XI R2 XI 3.x

Central Management Console yes yes!

Web Component Adapter (WCA) yes no

Administrative Launchpad yes no

Query Builder yes yes

Security Viewer Add-on yes no

Security Query no yes

Permissions Explorer no yes

Security Applications

Page 49: Sap inside track_2011_marks_sap_business_objects_security

Real Experience. Real Advantage.

[

49

[

] Thank you for participating.

SESSION CODE:

409

Please remember to complete and return your

evaluation form following this session.

For ongoing education on this area of focus, visit the Year-

Round Community page at www.asug.com/yrc

Dallas MarksSenior Architect and Trainer

[email protected]

http://dallasmarks.org/

For more information about Kalvin

Consulting

http://www.kalvinsoft.com/

Follow us on Twitter at @kalvinsoft.

[email protected]

513.492.9120