Security in SAP IDT

Last updated on Sep 24 2022
Sankar Rao

Table of Contents

Security in SAP IDT

Security of a Universe is defined when it is published into the repository. All published universes are available under the Universe folder and all connections are available in the Connection folder. To access a Universe or a connection in the repository, you can use Repository resources.

sap 65

Security policy on Universe, connections is applied on users and groups created in CMC. In Information Design tool, you can define security policy using Security editor. You can create security profiles in IDT and these profiles are assigned to users and groups.

You can define two types of security profiles in IDT −

  • Data Security Profile − In data security profile, the security policy is applied on Data Foundation objects and connections.
  • Business Security Profile − This include objects in Business layer on which the security profile is applied.

Security Editor in IDT

The Security Editor can be viewed in two ways: Using Universe or using users/groups. Select the tab in the Security Editor pane to display the view you want to work with.

The Universes/Profiles tab lets you to do tasks by first selecting a universe in the repository.

The Users/Groups tab lets you to do tasks by first selecting a user or group.

There are three icons in the Users/Groups panel that allows you to display users and groups in different ways −

  • Show Users
  • Show Groups
  • Show Hierarchies
  • sap 66

How to Open Security Editor in IDT?

In information design tool toolbar, click the Security Editor icon.

sap 67

Enter the session details to open in the security editor. If you are not already logged into the selected session, enter the required information.

The Security Editor opens in a new tab.

sap 68

Inserting and Editing Data Security Profiles

Go to Universes/Profiles pane in the Security editor. To insert a new profile, right-click on Universe → Insert Data Security profile.

sap 69

This will open a new window, you can define data security profile setting in different tabs. When you have defined all of the settings, click OK.

To save the changes to the security settings in the repository, click the save icon in the main toolbar.

sap 70

When you have defined all of the settings, click OK.

To save the changes to the security settings in the repository, click the save icon in the main toolbar. All Data Security profile settings are applied to Universes created on Data Foundation using Relation connection.

Connections Defines Replacement Connections
Controls Defines replacement query timeout and size limits
SQL Defines replacement query options
Rows Defines an SQL WHERE clause to restrict rows returned in the query
Tables Defines replacement tables

When you define more than one Data Security profile on one Universe, it is also possible to change the Data Security Profile Priority.

sap 71

This will open a new window → Change Security profile priority. You can use up/down arrow to change the priority of security profiles.

To save the changes in the repository, click the save icon in the main toolbar.

sap 72

Inserting and Editing a Business Security Profile

Select a Universe in Universe/Profile pane under the Security Editor. To insert a new Business Security Profile → Right-click → Insert Business Security profile.

sap 73

You can define security in each tab of Business Security profile. Reset option is used to reset the setting to default. Once the setting is defined, click OK to close the window and Save icon at the top to save the profile.

Create Query Defines the universe views and business layer objects available to the user in the query panel

Note − Create Query settings secure metadata only.

Display Data Grants or denies access to the data retrieved by objects in the business layer when the user runs a query.
Filters Defines filters using objects in the business layer.

sap 74Running a Query On a Published Universe

You can also run a query on Universe published in the repository. When you run a query on published Universe, security profile defined for Universe will be applied on the query panel.

To run a query on published Universe, go to Repository resources view → Select Universe → right-click and Run query.

sap 75

It opens the Query panel, you can add available objects to Result Objects and run query. Data Preview can be used to see the preview of resulted objects → Refresh button.

sap 76

So, this brings us to the end of blog. This Tecklearn ‘Security in SAP IDT’ blog helps you with commonly asked questions if you are looking out for a job in SAP Business Object and SAP Domain. If you wish to learn SAP IDT and UDT and build a career in SAP domain, then check out our interactive, SAP Business Objects Certification Training, that comes with 24*7 support to guide you throughout your learning period. Please find the link for course details:

https://www.tecklearn.com/course/sap-business-objects-certification-training/

SAP Business Objects Certification Training

About the Course

Business intelligence tools and features are used by multiple companies and firm for the effective results their large flow of data. The completion of this SAP Business Objects training will be helpful in landing yourself a good paying job. With this Business Objects online training, you will gain considerable proficiency in SAP BO architecture, data warehousing, use of Information design tool, create multiple reports and the implementation of Web intelligence and Efficiency in solving the issues of data sources and Crystal dashboard design.

Why Should you take SAP Business Objects Training?

  • The Average salary of SAP Business Objects Business Intelligence Analyst is $94,000 per annum – PayScale.com
  • Business Objects is an enterprise reporting tool and Scalability is one of the primary reasons large corporations choose Business Objects for their BI needs.
  • Worldwide Business Intelligence and Analytics Market to grow to $22.8 billion in next 2 years – Gartner.

What you will Learn in this Course?

Introduction to Business Objects

  • History and Version of Business Object
  • How Business Objects works in SAP family
  • SAP BO-Business Intelligence package and tool list
  • Data warehousing concept from SAP perspective

SAP Business Object Architecture

  • SAP BO Architecture
  • Various tiers in architecture: Client, Processing, Intelligence

SAP Web Intelligence

  • Web Intelligence Overview
  • Variable in Web Intelligence environment

Using Universe Designer Tools (UDT)

  • Overview of the Universe Designer Tool
  • Working with shared, secured and personal connections
  • Understanding of the Semantic layer

SAP BO Reports

  • SAP BO Reports
  • Chart Reports, Table Reports, Sorting and aggregating of Reports
  • Various elements of Reports, graphs, text elements
  • Reports and Filters
  • Section Report
  • Break Report
  • Alerts Report
  • Scope of Analysis Panel
  • Conditional Reporting
  • Ranked Report
  • Drill Report

Advanced Formatting

  • Advanced methods of formatting in SAP BO
  • Identifying Chasm trap and resolving Chasm traps with various methodologies
  • Detection and resolving of loop

Information Design Tool (IDT) Integration

  • Introduction to SAP BO information design tool
  • Extracting data from various sources using OLAP methodologies
  • Creating of Universe with IDT
  • IDT Vs UDT
  • Working with IDT as an Integration tool

Getting started with Crystal Dashboard

  • Data visualization tool for creating interactive dashboards
  • Point-and-click Features
  • Various dashboard features and interface

Live Office

  • Live office
  • Detailed design of Crystal Dashboard

SAP BO 4.2 Features

Got a question for us? Please mention it in the comments section and we will get back to you.

 

0 responses on "Security in SAP IDT"

Leave a Message

Your email address will not be published. Required fields are marked *