Top Banner
BW365 User Management and Authorizations . . COURSE OUTLINE . Course Version: 10 Course Duration: 3 Day(s)
31

User Management and Authorizations

Jan 30, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: User Management and Authorizations

BW365User Management and Authorizations

..

COURSE OUTLINE.

Course Version: 10Course Duration: 3 Day(s)

Page 2: User Management and Authorizations

SAP Copyrights and Trademarks

© 2014 SAP AG. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice.

Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors.

● Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation.

● IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, System z9, z10, z9, iSeries, pSeries, xSeries, zSeries, eServer, z/VM, z/OS, i5/OS, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server, PowerVM, Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER, OpenPower, PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner, WebSphere, Netfinity, Tivoli and Informix are trademarks or registered trademarks of IBM Corporation.

● Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

● Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries.

● Oracle is a registered trademark of Oracle Corporation

● UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.

● Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc.

● HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C®, World Wide Web Consortium, Massachusetts Institute of Technology.

● Java is a registered trademark of Sun Microsystems, Inc.

● JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape.

● SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries.

● Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company.

● Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company.

Page 3: User Management and Authorizations

All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary.

These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.

© Copyright . All rights reserved. iii

Page 4: User Management and Authorizations

iv © Copyright . All rights reserved.

Page 5: User Management and Authorizations

Typographic Conventions

American English is the standard used in this handbook.

The following typographic conventions are also used.

This information is displayed in the instructor’s presentation

Demonstration

Procedure

Warning or Caution

Hint

Related or Additional Information

Facilitated Discussion

User interface control Example text

Window title Example text

© Copyright . All rights reserved. v

Page 6: User Management and Authorizations

vi © Copyright . All rights reserved.

Page 7: User Management and Authorizations

Contents

ix Course Overview

1 Unit 1: SAP Business Warehouse (BW)

1 Lesson: Identifying SAP BW Architecture and Administration Tools1 Lesson: Creating and Modifying SAP Business Explorer (BEx)

Queries

3 Unit 2: Security Components

3 Lesson: Comparing Transactional and Analytical Security Needs3 Lesson: Differentiating Between Standard and Analysis

Authorizations3 Lesson: Protecting Data with Analysis Authorizations3 Lesson: Identifying the Prerequisites for Analysis Authorizations

5 Unit 3: Standard Authorization Objects for Reporting Users

5 Lesson: Creating Standard Authorizations for Reporting Users

7 Unit 4: Special Authorization Objects for Reporting Users

7 Lesson: Creating Analysis Authorizations for InfoProvider Data7 Lesson: Enabling and Disabling the InfoArea Structure7 Lesson: Identifying the Differences Between the Handling of

Workbooks and Queries in Roles

9 Unit 5: Analysis Authorizations

9 Lesson: Creating Analysis Authorizations for Data from a Specific InfoProvider

9 Lesson: Creating Analysis Authorizations for Specific Characteristic Values

9 Lesson: Creating Analysis Authorizations for Aggregated Values9 Lesson: Creating Analysis Authorizations for "Not Assigned" Values9 Lesson: Creating Analysis Authorizations for Display and

Navigational Attributes10 Lesson: Creating Key Figure Authorizations10 Lesson: Creating Hierarchy Authorizations10 Lesson: Adding Variables to Authorizations

11 Unit 6: Maintenance of Authorizations

11 Lesson: Maintaining Authorizations

© Copyright . All rights reserved. vii

Page 8: User Management and Authorizations

13 Unit 7: Data Access for Administrators and Users

13 Lesson: Securing Data Access for Administrators13 Lesson: Assigning Role-Based Authorizations using Templates13 Lesson: Tracing Performance Issues13 Lesson: Setting Up System Communication Security

15 Unit 8: Migration of Reporting Authorizations to Analysis Authorizations

15 Lesson: Migrating Reporting Authorizations to Analysis Authorizations

17 Unit 9: SAP Enterprise Portal

17 Lesson: Managing SAP Enterprise Portal Access for SAP BW Users17 Lesson: Publishing SAP BW Content in the SAP Enterprise Portal

19 Unit 10: SAP BusinessObjects Business Intelligence (BI) Platform

19 Lesson: Integrating SAP BW Security into the SAP BusinessObjects BI Platform

19 Lesson: Managing SAP BusinessObjects BI Platform Access for SAP BW Users

21 Unit 11: Additional Topics in SAP BW

21 Lesson: Differentiating Between Planning Tools21 Lesson: Identifying the Interaction Between Planning and Other SAP

BW Activities21 Lesson: Preventing and Troubleshooting Performance Issues21 Lesson: Generating Structural Authorizations from SAP ERP Human

Capital Management (HCM)

viii © Copyright . All rights reserved.

Page 9: User Management and Authorizations

Course Overview

TARGET AUDIENCEThis course is intended for the following audiences:

● Application Consultant

● System Administrator

© Copyright . All rights reserved. ix

Page 10: User Management and Authorizations

x © Copyright . All rights reserved.

Page 11: User Management and Authorizations

UNIT 1 SAP Business Warehouse (BW)

Lesson 1: Identifying SAP BW Architecture and Administration ToolsLesson ObjectivesAfter completing this lesson, you will be able to:

● Identify SAP BW architecture and administration tools

Lesson 2: Creating and Modifying SAP Business Explorer (BEx) QueriesLesson ObjectivesAfter completing this lesson, you will be able to:

● Create an SAP BEx query

● Modify an SAP BEx query

© Copyright . All rights reserved. 1

Page 12: User Management and Authorizations

Unit 1: SAP Business Warehouse (BW)

2 © Copyright . All rights reserved.

Page 13: User Management and Authorizations

UNIT 2 Security Components

Lesson 1: Comparing Transactional and Analytical Security NeedsLesson ObjectivesAfter completing this lesson, you will be able to:

● Compare transactional and analytical security needs

Lesson 2: Differentiating Between Standard and Analysis AuthorizationsLesson ObjectivesAfter completing this lesson, you will be able to:

● Differentiate between standard and analysis authorizations

Lesson 3: Protecting Data with Analysis AuthorizationsLesson ObjectivesAfter completing this lesson, you will be able to:

● Protect data with analysis authorizations

Lesson 4: Identifying the Prerequisites for Analysis AuthorizationsLesson ObjectivesAfter completing this lesson, you will be able to:

● Identify the prerequisites for analysis authorizations

© Copyright . All rights reserved. 3

Page 14: User Management and Authorizations

Unit 2: Security Components

4 © Copyright . All rights reserved.

Page 15: User Management and Authorizations

UNIT 3 Standard Authorization Objects for Reporting Users

Lesson 1: Creating Standard Authorizations for Reporting UsersLesson ObjectivesAfter completing this lesson, you will be able to:

● Create standard authorizations for reporting users

© Copyright . All rights reserved. 5

Page 16: User Management and Authorizations

Unit 3: Standard Authorization Objects for Reporting Users

6 © Copyright . All rights reserved.

Page 17: User Management and Authorizations

UNIT 4 Special Authorization Objects for Reporting Users

Lesson 1: Creating Analysis Authorizations for InfoProvider DataLesson ObjectivesAfter completing this lesson, you will be able to:

● Create analysis authorizations for InfoProvider data

Lesson 2: Enabling and Disabling the InfoArea StructureLesson ObjectivesAfter completing this lesson, you will be able to:

● Enable and disable the InfoArea structure

Lesson 3: Identifying the Differences Between the Handling of Workbooks and Queries in RolesLesson ObjectivesAfter completing this lesson, you will be able to:

● Identify the differences between the handling of workbooks and queries in roles

© Copyright . All rights reserved. 7

Page 18: User Management and Authorizations

Unit 4: Special Authorization Objects for Reporting Users

8 © Copyright . All rights reserved.

Page 19: User Management and Authorizations

UNIT 5 Analysis Authorizations

Lesson 1: Creating Analysis Authorizations for Data from a Specific InfoProviderLesson ObjectivesAfter completing this lesson, you will be able to:

● Create analysis authorizations for data from a specific InfoProvider

Lesson 2: Creating Analysis Authorizations for Specific Characteristic ValuesLesson ObjectivesAfter completing this lesson, you will be able to:

● Create analysis authorizations for specific characteristic values

Lesson 3: Creating Analysis Authorizations for Aggregated ValuesLesson ObjectivesAfter completing this lesson, you will be able to:

● Create analysis authorizations for aggregated values

Lesson 4: Creating Analysis Authorizations for "Not Assigned" ValuesLesson ObjectivesAfter completing this lesson, you will be able to:

● Create analysis authorizations for "Not Assigned" values

Lesson 5: Creating Analysis Authorizations for Display and Navigational AttributesLesson ObjectivesAfter completing this lesson, you will be able to:

● Create analysis authorizations for display and navigational attributes

© Copyright . All rights reserved. 9

Page 20: User Management and Authorizations

Lesson 6: Creating Key Figure AuthorizationsLesson ObjectivesAfter completing this lesson, you will be able to:

● Create key figure authorizations

Lesson 7: Creating Hierarchy AuthorizationsLesson ObjectivesAfter completing this lesson, you will be able to:

● Create hierarchy authorizations

Lesson 8: Adding Variables to AuthorizationsLesson ObjectivesAfter completing this lesson, you will be able to:

● Add variables to authorizations

Unit 5: Analysis Authorizations

10 © Copyright . All rights reserved.

Page 21: User Management and Authorizations

UNIT 6 Maintenance of Authorizations

Lesson 1: Maintaining AuthorizationsLesson ObjectivesAfter completing this lesson, you will be able to:

● Maintain authorizations

© Copyright . All rights reserved. 11

Page 22: User Management and Authorizations

Unit 6: Maintenance of Authorizations

12 © Copyright . All rights reserved.

Page 23: User Management and Authorizations

UNIT 7 Data Access for Administrators and Users

Lesson 1: Securing Data Access for AdministratorsLesson ObjectivesAfter completing this lesson, you will be able to:

● Secure data access for administrators

● Activate business content DataSources remotely

● Create a security role for data load administrators

Lesson 2: Assigning Role-Based Authorizations using TemplatesLesson ObjectivesAfter completing this lesson, you will be able to:

● Assign role-based authorizations using templates

Lesson 3: Tracing Performance IssuesLesson ObjectivesAfter completing this lesson, you will be able to:

● Trace performance issues

Lesson 4: Setting Up System Communication SecurityLesson ObjectivesAfter completing this lesson, you will be able to:

● Set up system communication security

© Copyright . All rights reserved. 13

Page 24: User Management and Authorizations

Unit 7: Data Access for Administrators and Users

14 © Copyright . All rights reserved.

Page 25: User Management and Authorizations

UNIT 8 Migration of Reporting Authorizations to Analysis Authorizations

Lesson 1: Migrating Reporting Authorizations to Analysis AuthorizationsLesson ObjectivesAfter completing this lesson, you will be able to:

● Migrate reporting authorizations to analysis authorizations

© Copyright . All rights reserved. 15

Page 26: User Management and Authorizations

Unit 8: Migration of Reporting Authorizations to Analysis Authorizations

16 © Copyright . All rights reserved.

Page 27: User Management and Authorizations

UNIT 9 SAP Enterprise Portal

Lesson 1: Managing SAP Enterprise Portal Access for SAP BW UsersLesson ObjectivesAfter completing this lesson, you will be able to:

● Manage SAP Enterprise portal access for SAP BW users

Lesson 2: Publishing SAP BW Content in the SAP Enterprise PortalLesson ObjectivesAfter completing this lesson, you will be able to:

● Publish SAP BW content in the SAP Enterprise portal

© Copyright . All rights reserved. 17

Page 28: User Management and Authorizations

Unit 9: SAP Enterprise Portal

18 © Copyright . All rights reserved.

Page 29: User Management and Authorizations

UNIT 10 SAP BusinessObjects Business Intelligence (BI) Platform

Lesson 1: Integrating SAP BW Security into the SAP BusinessObjects BI PlatformLesson ObjectivesAfter completing this lesson, you will be able to:

● Integrate SAP BW security into the SAP BusinessObjects BI platform

Lesson 2: Managing SAP BusinessObjects BI Platform Access for SAP BW UsersLesson ObjectivesAfter completing this lesson, you will be able to:

● Manage SAP BusinessObjects BI platform access for SAP BW users

© Copyright . All rights reserved. 19

Page 30: User Management and Authorizations

Unit 10: SAP BusinessObjects Business Intelligence (BI) Platform

20 © Copyright . All rights reserved.

Page 31: User Management and Authorizations

UNIT 11 Additional Topics in SAP BW

Lesson 1: Differentiating Between Planning ToolsLesson ObjectivesAfter completing this lesson, you will be able to:

● Differentiate between planning tools

Lesson 2: Identifying the Interaction Between Planning and Other SAP BW ActivitiesLesson ObjectivesAfter completing this lesson, you will be able to:

● Identify the interaction between planning and other SAP BW activities

Lesson 3: Preventing and Troubleshooting Performance IssuesLesson ObjectivesAfter completing this lesson, you will be able to:

● Prevent and troubleshoot performance issues

Lesson 4: Generating Structural Authorizations from SAP ERP Human Capital Management (HCM)Lesson ObjectivesAfter completing this lesson, you will be able to:

● Generate structural authorizations from SAP ERP HCM

© Copyright . All rights reserved. 21