Inheritance
Rights are set on an object for a principal to control access to the object. It's difficult for you to set the explicit value of every possible right for every principal on every object. If you have 100 rights, 1000 users, and 10,000 objects, you'll need to store billions of rights in memory and maintain each one.
Inheritance resolves this problem. With inheritance, the rights that principals have to objects in the system come from a combination of their memberships and objects. These memberships are in different groups and sub-groups, and the objects, have inherited rights from parent folders and sub-folders. These principals can inherit rights as the result of group membership. Sub-groups can inherit rights from parent groups. Principals can inherit rights from parent folders.
By default, principals who have rights to a folder inherit the same rights for any objects that are then published to that folder. The strategy is to set the appropriate rights for principals at the folder level first, then publish objects to that folder.
SAP BusinessObjects BI Platform 2025 recognizes two types of inheritance for an object security:
Inherit from Parent Folder
Inherit from Parent Group
- Inherit From Parent Group:
If needed, an administrator can disable this inheritance from parent group to set customized rights on an object.
- By default, this setting is enabled on any object in SAP BusinessObjects BI Platform 2025.
- The child group inherits the rights settings of the parent group by default, except for the rights that are explicitly set on the child group. Also, any changes to rights settings on the parent group apply to the child group by default.
- It is strongly recommended to keep enabled by default inheritance for parent group.

- Inherit From Parent Folder:
If needed, an administrator can disable this inheritance from parent folder to set customized rights on an object.
- By default, this setting is enabled on any object in SAP BusinessObjects BI Platform 2025.
- The child folder inherits the rights settings of the parent folder by default, except for the rights that are explicitly set on the child folder. Also, any changes to rights settings on the parent group apply to the child group by default.
- It is strongly recommended to keep enabled by default inheritance for parent folder.

Determining Effective Rights
We have seen that each access level grants some rights, denies some rights, and leaves the other rights unspecified. When a user group is granted several access levels, the system aggregates the effective rights and denies any unspecified rights by default.
- Aggregation of effective rights:
If a user belongs to more than one group, and a conflict on the same object (a folder, for instance) exists in the rights assignments between the groups to which the user belongs, the system aggregates the effective rights based on their place in the hierarchy of rights to apply them for the user:
- The Denied (D) right always overrules a Granted (G) right.
- The Granted (G) right always overrules a Not Specified (NS) right.
- Calculation rules:
Here are some examples of aggregation of several rights on a single object to calculate and apply effective rights for this object in SAP BusinessObjects BI Platform 2025:
- Not Specified (NS) + Not Specified (NS) = Not Specified (NS)
- Not Specified (NS) + Granted (G) = Granted (G)
- Not Specified (NS) + Denied (D) = Denied (D)
- Granted (G) + Denied (D) = Denied (D)
- Not Specified (NS) + Granted (G) + Denied (D) = Denied (D)
SAP BusinessObjects BI Platform 2025 will calculate these effective rights during the user's logon. If you change any right on SAP BusinessObjects BI Platform 2025, it is recommended to ask for the user to logoff then login again to take in account the updated security model.
To better understand aggregation of rights, let's see this sample table. It shows some predefined and custom access levels with their included rights on SAP BusinessObjects BI Platform 2025:

Now, let's see several security scenarios with a user (A01) belonging to two groups (G1 and G2) and two access levels set for a single object. Effective rights will be applied to the user A01 as shown in the following scenarios:






Watch the following video to determine effective rights scenarios involving users, groups and folders.
Following scenarios are covered in the video:
- A user is a member of a group. The user and group have different rights to the same folder.
- A user is a member of two different groups, and each group has been assigned different rights to the same folder.
- A user is a member of two different groups and each group have rights to folders at different levels.
- A user is a member of a subgroup that is a member of a group. The parent group is Granted and the subgroup is Denied to the same folder.
- A user is a member of a subgroup that is a member of a group. The parent group is Denied while the subgroup is Granted access to the same folder.
- A user is a member of a subgroup that is a member of a group. The group and subgroup have different assigned rights to a folder and subfolder.
- A subgroup is a member of a group and the user is a member of both the group and subgroup. The group and subgroup have different rights to the same folder.
Keep these considerations in mind when you set rights on an object:
- Each access level grants some rights, denies some rights, and leaves the other rights unspecified. When a user is granted several access levels, the system aggregates the effective rights and denies any unspecified rights by default.
- When you assign several access levels to a principal on an object, the principal has the combination of each access level's rights.
- Advanced rights can be combined with access levels to customize the rights settings for a principal on an object. But, if the advanced right contradicts a right in the access level, the advanced right will override the right in the access level.
- Rights override makes it possible for rights set on a child object to override rights that are inherited from the parent object.


