Controlling Web Intelligence Application

Objective

After completing this lesson, you will be able to configure application security in SAP BusinessObjects BI Platform 2025.

Controlling Application Security

Securing applications in CMC:
SAP BusinessObjects BI Platform 2025 gives security administrators the ability to control BI applications.
  • Only SAP BusinessObjects BI Platform 2025 applications can be secured. The BI Launch Pad, the CMC, Platform Search Application, and so on, are BI applications.
  • BI application features can be restricted for users and groups.
  • You can secure BI applications in the CMC by navigating to the Applications tab.
SAP BusinessObjects BI Platform 2025 applications can be secured in CMC.

User Security on Applications

  • You can access the User Security option for securing a BI application in CMC.
  • Securing application means adding access levels and user groups to say how to use and who will use the BI application.
User Security option in CMC is securing Applications on SAP BusinessObjects BI Platform 2025.
Default Security on BI applications:
  • Application security is set to allow everyone (Everyone group) access to BI application by default in view mode in the SAP BusinessObjects BI Platform 2025 (View predefined access level).
  • Only administrators (Administrators group) have full access (Full Control predefined access level) to BI applications by default.
Applications are secured like any other object with the three-steps process on SAP BusinessObjects BI Platform 2025 (What : Applications, Who : Principals, How : Access Levels).

For instance, if you want to restrict CMC application access only to administrators, you can assign No Access access level to the Everyone group for the CMC BI application.

Web Intelligence Application Security

Definition:
For securing the Web Intelligence application, you can set some specific rights in CMC on the following rights collections:
  • Web Intelligence Application right collection
  • Web Intelligence Content right collection
  • Universe (information design tool) right collection
  • Relational Connection right collection
  • Connection right collection

The following are the security requirements that need to be considered when designing this role:

  • Web Intelligence Application SecurityApplication Specific Rights for Web Intelligence.
  • Web Intelligence Content Security (folder and/or category)Content Specific Rights for Web Intelligence.
  • Universe SecuritySystem Specific Rights for Universe (information design tool).
  • Universe Connection SecuritySystem Specific Rights for Relational Connection.

Controlling Web Intelligence Interface

Web Intelligence Customization:
With access levels, you can control application security on the Web Intelligence application with access levels (rights for refreshing reports data, rights for viewing, editing and creating object, ...).
  • To customize which Web Intelligence features appear in the web-based user interface (for instance, interface elements like the application toolbar), you have to use Web Intelligence Customization.
  • As an administrator, you have the Web Intelligence Customization option available in CMC to customize which Web Intelligence features appear or not for which document folder.
  • All interface elements appear by default in Web Intelligence application. You can choose which interface elements to hide with Web Intelligence Customization.
  • Web Intelligence customization can be set at the Group level in CMC. As users are added to the group, they will inherit the modified settings.
You can customize in CMC which Web Intelligence features appear for a specific group.
A New Approach in Security:

With Web Intelligence customization, you can hide data sources types, edit mode toggle, turn-off the auto refresh feature, and many more.

  • Controlling Web Intelligence interface elements does NOT use the usual security approach based on usage of access levels (User Security option).
  • Instead, the dedicated Web Intelligence Customization option controls the Web Intelligence interface.
  • Customization is not exclusive, so it can be set up beside a Web Intelligence application security based on access levels.
List of features available for Web Intelligence customization.

In BI Launch Pad, you will see different interface elements in the Web Intelligence application based on your group membership.

Customized folders:
  • Additionally, this customization functionality can be confined to all the objects in specific folders by adding one or more folders to the customized folders list.
  • So you can add document folders in the Customized folders area for which you want to apply customization for the selected user group.

Note

You cannot remove Default Folders in the Customized folders area.

Web Intelligence customization using customized folders will display different features in different Web Intelligence documents.

Watch this video to see how to customize the Web Intelligence settings.

Secure an Application in SAP BusinessObjects BI Platform 2025

In this exercise, you will secure an application in SAP BusinessObjects BI Platform 2025.

Summary

  • SAP BusinessObjects BI Platform 2025 allows security administrators to control BI applications, including restricting features for users and groups, but standalone applications like Crystal Reports cannot be secured.
  • Administrators can create a Custom Access Level (CAL) with a combination of rights to support specific roles like Web Intelligence developers, applying this role to relevant folders, applications, connections, and universes.
  • The CMC allows customization of which Web Intelligence features appear for a group, with these settings inherited by users added to the group, and this customization can be applied to specific folders.