BW & Bi Security
BW & Bi Security
BW & Bi Security
Data warehousing in SAP BW represents the integration, transformation, consolidation, cleanup and
storage of data. It also signifies the extraction of data for analysis and interpretation. The data
warehousing process includes data modelling, data extraction and the management of the data
warehouse management processes.
SAP BW Authorization Specifics
2.
Standard authorization objects: This type of authorization objects is provided by SAP and covers
all checks for e.g. system administration tasks, data modelling tasks, and for granting access to
Info Providers for reporting. For this type of authorizations the same concept and technique is
used as in an SAP R/3 system.
Reporting authorization objects: For more granular authorization checks on an Info Providers
data you need another type of authorization objects defined by the customer. With these
objects you can specify which part of the data within an Info Provider a user is allowed to see.
Both types of authorization objects use the same authorization framework. Technically they are treated
in the same way. However, the design of reporting authorizations is more complex because you need to
design the reporting authorization objects first. This is an additional step that needs to be treated with
care because the structure of the authorization objects determines the possible use in regards to
selections, combinations and granularity. In your project you need expertise in the area of reporting
authorizations; knowledge of the basis authorization framework is not sufficient.
User Type in BW
There are different types of users in SAP BW. Most of your users will be the users who execute queries
and workbooks. These people could be considered "reporting users" or "end users." To read more about
how to secure reporting users click here
Reporting User Security
Authorization Objects Used Primarily by Reporting Users
In order to execute any query, you must have access to
S_RS_ICUBE, S_RS_COMP, S_RS_COMP1 and S_RS_FOLD.
S_RS_COMP is a powerful object that enables you to make choices on how to secure. There is one field
in S_RS_COMP that relates to the query, and another field that relates to the Info Cube. This gives you
the option to secure by query name, Info Area, or Info Cube.
Tips
Administrator
There are users who create new objects like Info Cubes,
Info Areas, and Info Objects. They also schedule data loads, create update
rules for Info Cubes, monitor performance, and set up source systems. The
users who do these tasks are normally referred to as "administration users."
Some of the common tasks performed by administration users are:
The following list shows possible values for the Activity field.
Maintain - 03
Execute-16
Administer document storage - 23
Update metadata - 66
Authorizations for working with individual Info Objects and their subobjects
Until Release 3.0A, only general authorization protection was
possible with authorization object S_RS_ADMWB. General
authorization protection for Info Objects still works as in the past.
Special protection with S_RS_IOBJ is only used if there is no
authorization for S_RS_ADMWB-IOBJ.
Authorizations for working with Info Sources with flexible updating
and their sub-objects
Authorizations for working with InfoSources with direct updating and
their sub-objects
Authorizations for working with InfoCubes and their sub-objects
2.
3.
4.
Since there are no reporting authorization objects provided for Info Objects, you will
have to create your own reporting authorization object for any Info Object you decide
to secure. This is done in transaction code RSSM. When creating your reporting
authorization object, you select which fields to put in the authorization object from a list
of authorization-relevant Info Objects. Only Info Objects that have been marked
Authorization Relevant are eligible to be put in a reporting authorization object.
Add your new authorization object to a role.
Once you have created a new reporting authorization object and linked it to the
appropriate Info Cube(s), users will need access to your reporting authorization object.
You will need to manually insert your object into a role.
Add a variable to the query.
The reason the variable is required is sometimes unclear at first. If we want a query to
5.
6.
7.
8.
9.
only provide results based on the division, for example, then the query itself needs the
ability to filter specific division values. Before we can secure on division, the query must
be able to restrict data by division. The only way the query can restrict data
dynamically is through a variable.
Link the reporting authorization object to an Info Provider.
Linking your reporting authorization object to an Info Provider is a very critical step. In
this step, you will impact people currently executing queries for the Info Provider that is
now related to your reporting authorization object. This linkage forces your reporting
authorization object to be checked when ANY query tied to the Info Provider is
executed.
In the SAP Easy Access screen of the SAP Business Information
Warehouse choose Business Explorer >> Authorizations>> Reporting Authorization
Objects.
Choose Authorization Object >> Create. Enter a technical name and a description for
the reporting authorization object. Save your entries. On the right-hand side, you get
an overview of all the Info Objects indicated as authorization-relevant.
Caution: Only those characteristics that have previously been marked as authorizationrelevant in Info Object maintenance can be assigned to a reporting authorization object
as fields.
Assign the InfoObject fields to the reporting authorization object:
Select the characteristics for which an authorization check of the selection conditions
should be carried out.
Select the InfoObject key figure (1KYFNM) if you want to restrict the authorization to a
single key figure.
Select the Info Object (0TCTAUTHH) if you want to check authorizations for a hierarchy.
Save your entries
How the reporting user accesses workbooks, and security related to workbooks.
You must set up security to control who can save workbooks, where they can be saved, and which
workbooks appear in the BEX Browser for a specific user.
Workbooks can also be created in the BEX Analyzer. After executing a query, choose Save Save as
new workbook.
Securing Workbooks
In order to save a workbook, a user needs two authorization objects. The two objects listed below are
the minimum authorizations a user needs to save workbooks.
Using both S_GUI and S_BDS_DS will enable a user to save workbooks to their Favorites folder.
The authorization object S_GUI has one field, Activity. The activity field must be set to 60. For
S_BDS_DS, the user needs activities 03 and 30. The Class Type field should be set to OT.
2.
3.
4.
5.
6.
7.
8.
9.
5.
6.
Specify a technical name for this definition. If you do not enter a value, a unique ID is set.
Now create an authorization for the new authorization object. To do this, enter the technical
name of the definition as a characteristic value for the characteristic 0TCTAUTHH. For the
characteristic defined on the hierarchy, specify the value" ." (blank). It often makes sense to
also enter ":" (colon) so that queries without this characteristic are also allowed.
Hint: If you enter the value "*" here (all characteristic values), the user is allowed to view data
for all characteristic values, regardless of whether a hierarchy is used or a complete drilldown is
carried out.
7.
Top of hierarchy: This option allows you to select the top of the hierarchy instead of a
node in the hierarchy.
If, for example, you want to authorize a user to work with a hierarchy from the top
node, down to a particular level, you can of course authorize the user for the highest
node in the hierarchy. If, on the other hand, the hierarchy is used in the query without
a filter set for this node, the user is not able to execute the query.
This is because the node that is displayed at the highest level in the hierarchy, is not
actually the top of the hierarchy. For example, there is the .All Other Leaves. node. This
is an internal node, but a node in the hierarchy nevertheless, and it is this node that is
at the top of the hierarchy, a level higher than the highest node that appears in the
hierarchy display. If the hierarchy is used in the query, and the top-level node has not
been specified explicitly, the system checks the authorization against the highest node
in
the hierarchy, meaning the internal node that is not displayed. This option, therefore,
allows you to determine the top-level node of the hierarchy yourself, so that you can
ensure that users are assigned the appropriate authorizations.
Hierarchy level : Within the framework of the authorization check, you can use this
value to specify to which level the user can expand the hierarchy.
Please note that this is an absolute value and refers to the entire hierarchy. The highest
node of a hierarchy stands at level 1.
If you have entered the value 3 for the
hierarchy level, for example, then the user can expand/see the hierarchy up to level 3.
Validity period :
Node variable default value: If this option is chosen, this definition of a hierarchy
authorization is used as the default value for node variables.
If a user is allocated several authorizations for subareas of the same hierarchy, one of
these authorizations must be defined as the default value in this way. Only one node
can be chosen for a node variable in the variable screen of a query. In order that this
variable be filled from the authorizations, the correct variable type must be chosen and
an authorization must be marked as the default value.
Now in-order to assign analysis authorizations to user we can do it in two ways one way is to
go to RSECADMIN transaction code and click on User tab and click on Assignment
button which would take us to RSU01 transaction and enter the user id to whom the
Analysis Authorization needs to be assigned enter the analysis authorization name and click
on insert button
The other way round is directly adding the Analysis Authorization in users role under the
object S_RS_AUTH in the BIAUTHfield .
Find the Analysis Authorization in which the cube is maintained
1. Run transaction SE16-Data Browser. Enter RSECVAL in the Table Name field.
2. Enter the name of the Cube in the field TCTLOW-Internal char. value field and Execute.
3. Screen Data Browser:Table RSECVAL Select Entries will be displayed. Select the
Analysis Authorization from the Column TCTAUTH-Authorization based on the affiliate.
lt
Now Enter the Authorization Object name as S_RS_AUTH in the field Object1. Click
Enter. Enter the Analysis Authorization under the field BI Analysis Authorizations which was
obtained from table RSECVAL Now Execute and you will find the Roles in which the Analysis
Authorization is maintained.
- S_RS_IOBJ
- S_RS_ISOUR
- S_RS_ISRCM
Apart from the above two classes of authorization objects in SAP BW, there are a set of
common authorization objects which are used in BW. These common authorization objects
are required by all users as these auth_objects are checked in different areas. The common set
of authorization objects used in SAP BIW include S_RS_ICUBE, S_RS_ODSO and
S_RS_HIER. One key point to note is that BW reporting authorization objects for field level
security are created as needed whereas the BW administration authorization objects are used
across the module to secure admin functions.
SAP BW Security transaction codes
Transaction Code Description RSA1 Transaction RSA1 is the main transaction for
administrative functions in SAP BW (Administrator Workbench)
RSD1 This transaction code can be used to mark objects as relevant for authorization
(InfoObject Maintainence)
RSSM This transaction code can be used to create and modify authorization objects in
SAP BW RSZV This transaction code is used to create or modify the variables for
authorization checks. (Variable Maintenance)
RRMX Business Explorer is the reporting tool in SAP BW and is used for analyzing
data. GLOBAL_TEMPLATES Templates for modelling and evaluating data