SAP Authentication in CMC
Till now we have created users and group in the CMC and mapped these groups to application and content rights.
Read MoreLearn SAP Security & Authorizations Concepts
Security for the Business Objects Applications
Till now we have created users and group in the CMC and mapped these groups to application and content rights.
Read MoreJust like rights for content, Business Objects also allows us to set the rights that users have for specific application
Read MoreBOBJ is a reporting tool and an end user would typically use the BI launchpad to execute reports assigned to
Read MoreEach of the applications in the BOBJ suite which are administered through the CMC exposes different rights on themselves to
Read MoreLike most other SAP applications, BOBJ uses a Role Based Access Control Mechanism. To assign roles or rights to a
Read MoreCentral Management Console or CMC is the central cockpit where the security consultant will spend most of his time. The
Read MoreTill a few years back Business Objects used to be a company whose products were used in many enterprise reporting
Read More