The BusinessObjects Security Model - dummies

By Derek Torres, Stuart Mudie, Julie Albaret

Part of BusinessObjects XI Release 2 For Dummies Cheat Sheet

BusinessObjects XI Release 2 provides a pretty complex suite of reporting, query and analysis, and performance-management tools. Such a broad range of products clearly has to cater to the needs of a variety of different user profiles, while at the same time handling security and access rights that become ever more complex as your system grows. You need a clear understanding of the BusinessObjects XI R2 security model and how it lets you manage what users can and cannot do.

Three key concepts you need to retain when thinking about the BusinessObjects security model are objects, groups, and users:

  • Objects: Objects lie at the heart of the BusinessObjects system. In BusinessObjects XI R2, objects can include reports, Web Intelligence documents, Microsoft Office files (Word, Excel, or PowerPoint), Adobe Acrobat PDFs, text files, hyperlinks, folders, and more.

  • Groups: A group is a logical grouping of individuals who all require similar rights and permissions. Combining them in this way allows you to make any changes to their rights and permissions in one place instead of having to modify each user’s account individually.

    Examples of groups could include specific roles (such as the group of people responsible for designing BusinessObjects universes) or particular departments or teams (such as managers in the Accounts Department).

  • Users: A user is each individual person who needs to interact with the BusinessObjects system in some way.