Cantitate/Preț
Produs

SAP BusinessObjects BI Security (SAP Press)

De (autor) ,
Notă GoodReads:
en Limba Engleză Carte Hardback – 28 Dec 2012
"Don'ttalktostrangers"-ifonlydatasecuritypolicieswerethiseasy.LearntokeepyourSAPBusinessObjectsBusinessIntelligencedatatrulysafefromunauthorizedactionswiththiscomprehensiveguide.Beginwithsecuritybasicsandworkyourwaytoadvancedconcepts;alongtheway,you'llexplorefunctionalanddatasecurity,definearightsmodel,andsecuredatasourcesanduniverses.Step-by-stepinstructionsensurethatyoucanimplementimportantsecuritytechniquesinyouradministrationanddesignwork.Thisbookputsthemasterkeytodatasecurityinyourhands.

1.BestPracticesUnveiledImplementasecuritysystemthatiseasytounderstand,use,andenhancebyusingbasicworkflows.

2.RightsFrameworkPuttherightsframeworktoworkforyouusinggroupandfolderinheritanceandcustomaccesslevels.

3.SpecificRightsExplorethespecificrightsofsystemandcontentobjectsstoredintheCMSrepository,aswellasBI4.0suiteapplications.

4.UniverseSecurityComparesecurityfeaturesofuniversescreatedwithUniverseDesignToolsidebysidewithitssuccessor,InformationDesignTool.

5.SAPNetWeaverBW,LDAP,andActiveDirectoryLearnhowtosecureyourSAPBusinessObjectsBI4.0systemusingexternalauthenticationsystemsanddatasources.
HighlightsInclude:

  • SAP NetWeaver BW, LDAP, and Active Directory authentication
  • Single sign-on
  • Rights framework and inheritance model
  • Access levels
  • General and specific rights
  • Secured connections
  • Universe security
  • Access restriction
  • Data and business security profile
  • Scheduling, publications, and personalization profile

  • ]]>
    Citește tot Restrânge

    Din seria SAP Press

    Preț: 41083 lei

    Preț vechi: 45147 lei
    -9%

    Puncte Express: 616

    Preț estimativ în valută:
    8220 9158$ 7080£

    Carte disponibilă

    Livrare economică 06-20 noiembrie
    Livrare express 29 octombrie-05 noiembrie pentru 9032 lei

    Preluare comenzi: 021 569.72.76

    Specificații

    ISBN-13: 9781592294374
    ISBN-10: 1592294375
    Pagini: 562
    Dimensiuni: 187 x 237 x 41 mm
    Greutate: 1.14 kg
    Editura: Rheinwerk Verlag GmbH
    Seria SAP Press


    Notă biografică

    ChristianAh-SoonhasworkedforSAPBusinessObjectsfor13yearsasaprogrammanagerontransversalareaslikeadministration,security,internationalization,andinstallation.Forthelastmajorrelease,SAPBusinessObjectsBI4.0,heworkedontheSemanticLayerteam.ChristianholdsaPh.D.incomputerscienceandgraduatedfromTELECOMNancy.

    Cuprins


    Acknowledgments...21
    1.IntroductiontoSecurityinSAPBusinessObjectsBusinessIntelligence4.0...23


    1.1...BusinessIntelligenceOverview...23
    1.2...SystemSecurityConsiderations...24
    1.3...ABriefHistoryofBusinessObjects...26
    1.4...SAPBusiness­ObjectsBusinessIntelligence4.0Review...27
    1.5...BookRoadmap...29


    2.AdministrationandSecurity...33


    2.1...BI4.0Deployment...34
    2.2...BI4.0Installation...36
    2.3...AdministrationTools...44
    2.4...CMSRepositoryandFileRepositoryServer...47
    2.5...Cryptography...53
    2.6...BI4.0Servers...58
    2.7...Auditing...62
    2.8...Summary...65


    3.UsersandAuthentication...67


    3.1...UserAuthentication...68
    3.2...EnterpriseUsersandGroups...73
    3.3...ManagingUsersandGroupsintheCMC...80
    3.4...TrustedAuthentication...94
    3.5...AliasesandExternalAuthentications...99
    3.6...ManagingAliasesintheCMC...106
    3.7...ManagingLDAPAuthenticationintheCMC...111
    3.8...ManagingActiveDirectoryAuthentication...121
    3.9...Summary...142


    4.RightsFramework...145


    4.1...AssignedRights...145
    4.2...GeneralandSpecificRights...146
    4.3...Inheritance...148
    4.4...Non-OwnerandOwnerVersionsofRights...155
    4.5...ObjectsGeneralRights...157
    4.6...ApplicationGeneralRights...163
    4.7...ManagingRightsintheCMC...165
    4.8...AccessLevels...171
    4.9...ManagingAccessLevelintheCMC...175
    4.10...RunningAdministrationQueriesintheCMC...181
    4.11...Summary...185


    5.ApplicationsandRightsReference...187


    5.1...ApplicationsList...188
    5.2...SystemObjectsList...194
    5.3...ContentObjectList...196
    5.4...Analysis,EditionforOLAP...199
    5.5...BExWebApplications...200
    5.6...BILaunchPad...200
    5.7...Widgets...202
    5.8...BIWorkspaces...203
    5.9...CentralManagementConsole...206
    5.10...SAPCrystalReports...207
    5.11...Explorer...209
    5.12...InformationDesignTool...221
    5.13...PromotionManagement...228
    5.14...SAPBusiness­ObjectsMobile...236
    5.15...SAPStreamWork...237
    5.16...UniverseDesignTool...238
    5.17...VersionManagement...244
    5.18...VisualDifference...249
    5.19...WebIntelligence...250
    5.20...UsersandGroups...277
    5.21...Connections...279
    5.22...NoteRights...283
    5.23...ScheduleOutputFormat...284
    5.24...Summary...285


    6.ConnectionsandDatabaseAuthentications...287


    6.1...SecuredConnections...288
    6.2...LocalConnections...293
    6.3...ConnectionAuthenticationMode...295
    6.4...UsingCredentialsMappingforSingleSign-On...301
    6.5...ManagingConnections...303
    6.6...Summary...314


    7.UniverseSecurityinUniverseDesignTool...317


    7.1...Universe...318
    7.2...UsingFiltersonTable,Object,Class,orUniverse...323
    7.3...UsingFiltersinUniverseDesignTool...325
    7.4...AccessRestrictionDefinition...330
    7.5...AccessRestrictionAggregation...337
    7.6...ManagingAccessRestrictionsinUniverseDesignTool...339
    7.7...ObjectAccessLevel...354
    7.8...ManagingObjectAccessLevels...355
    7.9...Summary...359


    8.UniverseSecurityinInformationDesignTool...361


    8.1...IntroductiontoNewUniverse...362
    8.2...DefiningWHEREClausesandFiltersinInformationDesignTool...366
    8.3...SecurityProfiles...370
    8.4...DataSecurityProfiles...375
    8.5...BusinessSecurityProfiles...382
    8.6...ManagingSecurityProfilesinInformationDesignTool...395
    8.7...ObjectAccessLevel...431
    8.8...UserAttributes...434
    8.9...ManagingUserAttributesintheCMC...436
    8.10...RunningaSecuredQuery...439
    8.11...Summary...441


    9.SchedulingandPublishing...443


    9.1...SchedulingandPublishingFramework...444
    9.2...Scheduling...445
    9.3...Publishing...449
    9.4...PublicationRecipients...452
    9.5...PublicationPersonalizationandProfile...456
    9.6...ReportBurstingOptions...463
    9.7...Summary...466


    10.SecurityforSAPNetWeaverBWDataSources...467


    10.1...SAPAuthentication...468
    10.2...ConfiguringSAPAuthentication...475
    10.3...SAPConnections...482
    10.4...CreatingSAPNetWeaverBWConnections...486
    10.5...SAPAuthenticationandSingleSign-On...494
    10.6...SNCandSTS...495
    10.7...ConfiguringSTS...498
    10.8...UserAttributes...505
    10.9...Summary...505


    11.DefiningandImplementingaSecurityModel...507


    11.1...GeneralRecommendations...507
    11.2...DefiningUsersandGroups...509
    11.3...DefiningFoldersandObjects...511
    11.4...DefiningRights...512
    11.5...DefiningAccessLevels...514
    11.6...MandatoryRightsforCommonWorkflows...517
    11.7...SettingSecurityforExternalGroups...521
    11.8...DelegatedAdministration...522
    11.9...DefiningDatabaseFiltering...525
    11.10...UniverseSecurity...527
    11.11...CombinedAuthentication...531
    11.12...TestingaSecurityModel...533
    11.13...Summary...534


    Appendices...535


    A...UniverseComparisonandConversion...535
    B...TheAuthors...551


    Index...553