• USA : +1 973 910 5725
  • INDIA: +91 905 291 3388
  • info@tekslate.com
  • Login

Security Model In SAP BPC

Security ModelCapture.286

-The language used for member formulas is MDX (Multi Dimensional Language); however, only a subset of all the MDX instructions is available inside EPM member formulas.

-Member formulas are dimension related. This means they are valid for all the models sharing those dimensions.

-Once you have set up a member formula the related dimension must be processed in order to make the formula applied.

-Member formulas are calculated on the fly: calculated values are not stored in the database.

Note: Pay attention to the number of member formulas you define in your model. They may dramatically decrease application performance.

Capture.287

Administrators must specifically assign task profiles to users or teams of users before they can access any tasks. Similarly, if they do not assign data access profiles to users or teams to define access to members of a secured dimension, no one has access to that dimension.

Capture.288

Capture.289

Capture.290

-These roles do not include all possible combinations with restrictions for CLM actions (for example, copy, delete, and deploy content). These roles are more generic in nature and are supplied for reference to the CLM managed application.

-In real scenarios, more strict authorization values could be needed to restrict access to specific CLM actions.

-The application uses the classic authorization concept provided by SAP NetWeaver. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver Application Server ABAP Security Guide also apply to the application.

-The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role maintenance, use the profile generator (transaction PFCG).

-You can restrict user actions using task profiles and data access profiles:

-Task profiles define what type of activities or tasks a user or a team of users can perform.

-Data access profiles define the specific models and data within the models to which users have access.

Capture.291

Capture.292

-These roles do not include all possible combinations with restrictions for CLM actions (for example, copy, delete, and deploy content). These roles are more generic in nature and are supplied for reference to the CLM managed application.

-In real scenarios, more strict authorization values could be needed to restrict access to specific CLM actions.

Capture.293

A web UI URL to access BPC 10 is http://<host>:<port>/sap/bpc/web

Capture.294

-If you want a user to perform administration tasks, you must assign them one of the predefined administrator roles. Without one of these roles, the user cannot perform any administrator tasks.

Capture.295

Capture.296

-Adding a Task Profile

-To create a new task profile in the Administration workspace, choose Security > Task Profiles > New. Enter data as required.

Capture.297

Interested in mastering SAP BPC Training? Enroll now for FREE demo on SAP BPC Training.

Capture.298

Capture.299

Capture.300

Capture.301

Capture.302

Capture.303

Capture.304

Capture.305

Capture.306

Capture.307

Capture.308

Capture.309

Capture.310

Capture.311

Capture.312

Capture.313

Capture.314

-If you grant access to a member that has 10 children, users with access to the parent member also have access to the 10 children.

-You can restrict a child member of a parent with Read Only or Write access by creating a separate data access profile and assigning the child Denied Alternatively, you can use the same data access profile as the parent, but create a new line item for the child.

-When there is a conflict between data access profiles, the least restrictive profile is always applied.

Capture.315

Security > Data Access Profile > New

Capture.316

Security > Data Access Profile > Edit

Capture.317

Security > Data Access Profile > Copy

Capture.318

Security > Data Access Profile > Delete

 For indepth understanding click on

Summary
Review Date
Reviewed Item
Security Model In SAP BPC
Author Rating
5

“At TekSlate, we are trying to create high quality tutorials and articles, if you think any information is incorrect or want to add anything to the article, please feel free to get in touch with us at info@tekslate.com, we will update the article in 24 hours.”

0 Responses on Security Model In SAP BPC"

    Leave a Message

    Your email address will not be published. Required fields are marked *

    Site Disclaimer, Copyright © 2016 - All Rights Reserved.

    Support


    Please leave a message and we'll get back to you soon.

    I agree to be contacted via e-mail.