SAP BI Security
Vishwas Goel
Copyright 2010 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture.
Course Objective
SAP BI & BEx Overview
Security Components in BI
Securing Data Access for Reporting Users
Analysis Authorizations
Authorization Maintenance
Create Analysis Authorizations
Assign Analysis Authorizations
Monitoring Analysis Authorizations
Copyright 2010 Accenture All Rights Reserved. 2
SAP BI Security
SAP BI Overview
Copyright 2010 Accenture All Rights Reserved. 3
What is Business Intelligence?
Business intelligence refers to the
process of turning data into
information, information into
knowledge and knowledge into action Data Information
for business gain.
It is an end-user activity that is
facilitated by various analytical and
collaborative tools and applications
as well as a data warehousing
infrastructure.
Action Knowledge
Copyright 2010 Accenture All Rights Reserved. 4
BI Objectives
Standardized structuring and display of all business
information.
Simple access to business information via a single point of
entry.
Highly developed reporting for analysis with self service
for all areas.
Quick and cost-efficient implementation.
High performance environment. Data modeling from
heterogeneous sources.
Relieving OLTP systems.
Copyright 2010 Accenture All Rights Reserved. 5
BI Architecture
Copyright 2010 Accenture All Rights Reserved. 6
Extracting, Transforming & Loading
Data
Copyright 2010 Accenture All Rights Reserved. 7
Information in BI
In BI, objects that provide information for reporting and analysis are called
InfoProviders. There are two types of InfoProviders:
InfoObjects, InfoCubes, and Data Store Objects contain PHYSICAL data.
InfoSets, RemoteCubes, and MultiProviders are LOGICAL structures and do not
contain data.
An InfoCube is a transaction data container. In an InfoCube, data is organized in
terms of business dimensions. When reporting from an InfoCube, users can perform
multidimensional analysis from different business perspectives. For example, sales
analysis could be performed across different geographic regions or distribution
channels.
MultiProviders are used to combine data from various objects. A MultiProvider
provides access to data from several InfoProviders and makes the data available for
reporting and analysis. A MultiProvider can be assembled from different
combinations of InfoProviders.
Copyright 2010 Accenture All Rights Reserved. 8
SAP BI Security
Business Explorer
Suite
Copyright 2010 Accenture All Rights Reserved. 9
Business Explorer Suite
Copyright 2010 Accenture All Rights Reserved. 10
Business Explorer Suite
The Business Explorer Browser is the instrument for
accessing reports and other executable objects which are
assigned to a user.
The Business Explorer Analyzer can be used to execute,
navigate, and further process reports using MS Excel.
The Query Designer is used to create BI queries. It is a very
flexible and user-oriented tool.
Copyright 2010 Accenture All Rights Reserved. 11
Exercise
Create and Execute
a BI Query
Copyright 2010 Accenture All Rights Reserved. 12
SAP BI Security
Security
Components in BI
Copyright 2010 Accenture All Rights Reserved. 13
Authorization Concept
Based on roles and authorization concept
Users are assigned to roles
Roles contain authorizations
Authorizations are defined for authorization objects
The system checks authorization objects against the
authorizations of the user
Copyright 2010 Accenture All Rights Reserved. 14
Comparison of OLTP Systems &
OLAP Systems
OLTP Systems OLAP Systems
(Operative Environment) (Informative Environment)
Efficiency through automation of
Target Generating knowledge
business processes
High availability, higher data Simple to use, flexible access to
Priorities
volumes data
View of Data Detailed Aggregated
Age of Data Current Historical
Add, modify, delete (update) and
Database operations Read
read
Typical data structures Flat tables Multidimensional structures
Integration of Data from
Minimal Comprehensive
various applications
Data set 6-18 months 2-7 years
Archiving Yes Yes
Copyright 2010 Accenture All Rights Reserved. 15
Comparison of OTLP and OLAP
Security
Security in mySAP ERP (OLTP)
Transaction-based security
Restricts on:
Transaction codes
Specific field values
Which activities a user can perform
Focused on getting daily work completed as quickly and efficiently as possible
Security in SAP NetWeaver BI (OLAP)
Analysis-based security
Restricts on:
InfoProviders (InfoCube, DataStore Objects)
Queries
Data or Infoareas
Different business purpose and goals than OLTP
Focused on displaying, planning, and analyzing data
Copyright 2010 Accenture All Rights Reserved. 16
Authorizations in NW2004s
Standard Authorizations
Based on standard role and authorization concept of SAP
Was and still are used for BI administrator and developer activities
Reporting Authorizations
Old security concept up to SAP NetWeaver 04 (up to SAP BW 3.5)
Control for which data a user has access to in a query
Realized through the standard authorization concept, which has many
limitations
Analysis Authorizations
New security concept as of SAP NetWeaver 2004s
Is not based on standard authorization concept in order to overcome the
limitations
Takes features of reporting and analysis in BI into consideration
Copyright 2010 Accenture All Rights Reserved. 17
Limitations of earlier SAP BW
releases
Copyright 2010 Accenture All Rights Reserved. 18
Improvements with SAP NetWeaver
2004s
Copyright 2010 Accenture All Rights Reserved. 19
Authorizations in BI
Authorization Objects in BI
Authorization objects are grouped according to authorization object
classes. The major authorization object class in BI is RS.
Primary Authorization object used by Reporting Users - S_RS_COMP
Primary Authorization object used by Administrators - S_RS_ADMWB
Copyright 2010 Accenture All Rights Reserved. 20
Exercise
Explore the
Authorization Objects
S_RS_COMP &
S_RS_ADMWB
Copyright 2010 Accenture All Rights Reserved. 21
S_RS_COMP
Copyright 2010 Accenture All Rights Reserved. 22
S_RS_ADMWB
Copyright 2010 Accenture All Rights Reserved. 23
SAP BI Security
Securing Data
Access for Reporting
Users
Copyright 2010 Accenture All Rights Reserved. 24
Authorization Level
On InfoCube Level
On Characteristic Level
On Characteristic Value Level
On Key Figure Level
On Hierarchy Node Level
Copyright 2010 Accenture All Rights Reserved. 25
On Characteristic Level
Authorization
Copyright 2010 Accenture All Rights Reserved. 26
On Characteristic Value Level
Authorization
Copyright 2010 Accenture All Rights Reserved. 27
On Key Figure Level
Authorization
Copyright 2010 Accenture All Rights Reserved. 28
SAP BI Security
Analysis
Authorizations
Copyright 2010 Accenture All Rights Reserved. 29
Analysis Authorizations
Analysis Authorizations are fundamental building blocks of the
new reporting concept which contains both the data value and
hierarchy restrictions.
This is also called data level access. With the new NW2004s
analysis authorisation principles it is now possible to create an
analysis authorisation object directly on an info object
The authorisation can either be single values or a value range or
created with a reference to a hierarchy, provided the info object is
created with a hierarchy and the info object is authorisation
relevant.
Copyright 2010 Accenture All Rights Reserved. 30
Analysis Authorizations
Scenario: Sufficient Authorizations
Complete selection is subset of
Query
authorizations Selection
Query results will be shown
Authorizations
Scenario: Insufficient Authorizations
Complete or part of selection is outside
of authorizations
Query results will not be Query
Selection
shown at all
Authorizations
Copyright 2010 Accenture All Rights Reserved. 31
Exceptions for All-or-Nothing Rule
Display hierarchies are automatically filtered by the
authorization
Key figure values are not displayed if the key figure is not
authorized
Copyright 2010 Accenture All Rights Reserved. 32
SAP BI Security
Authorization
Maintenance
Copyright 2010 Accenture All Rights Reserved. 33
Before You Start
Activate all Business Content related to authorizations before you
get started
InfoObjects: 0TCA* (and 0TCT* if not done already)
InfoCubes: 0TCA*
Set the following InfoObjects as authorization-relevant
0TCAACTVT
0TCAIPROV
0TCAVALID
0TCAKYFNM
Copyright 2010 Accenture All Rights Reserved. 34
Authorization Relevant
Characteristics
InfoObjects must be flagged as Authorization Relevant before
they can be secured.
1. Execute T-code RSD1
2. Enter the info object name
3. Go to Business Explorer Tab
4. Select the check box
Authorization Relevant
5. Activate the info object
Copyright 2010 Accenture All Rights Reserved. 35
Authorizing Characteristic Values
Copyright 2010 Accenture All Rights Reserved. 36
Authorizing Characteristic Values
Possible Values
EQ: Single value
BT: Range of values
CP: Contains (simple) patterns ending with * (e.g., XY*)
Copyright 2010 Accenture All Rights Reserved. 37
Special Authorization Values
* (asterisk)
Denotes a set of arbitrary characters
Used alone to grant access to all values
Used at the end of a value to specify a simple pattern (example: SAP*)
: (colon)
Allows access only to aggregated data (e.g., allows information on all
sales areas only on aggregated level not on particular sales areas)
+ (plus)
Denotes exactly one character
Used at the end of a value to specify a simple pattern (example: RED+)
Used to specify date patterns (only for Validity (0TCAVALID))
# (hash)
Stands for the initial or unassigned value
Copyright 2010 Accenture All Rights Reserved. 38
Special Authorization
Characteristics
These special characteristics must be assigned to a user in at least
one authorization:
0TCAACTVT: Restrict access to activities i.e. display, create,
change etc.
0TCAIPROV: Restrict access to the InfoProvider i.e. InfoCube,
ODS, MultiProvider etc.
0TCAVALID: Provides the validity of the analysis authorization
All these authorization should be marked as authorization relevant.
Copyright 2010 Accenture All Rights Reserved. 39
Authorization Variables
Variables of type Customer Exit can be used with the special
value $ (as escape sequence) as prefix before the variable
name. This enables dynamic granting of authorizations
(authorized values are retrieved at runtime).
Customer exit reads the variable values using a selection
routine placed in the function module EXIT_SAPLRRBR_001
inside of enhancement RSR0001. (This Enhancement is
accessed via transaction code CMOD).
Copyright 2010 Accenture All Rights Reserved. 40
Contd
The advantage of this method is
that you can give all users the
same authorization by placing
the variable name with a $ sign
in front of it instead of a value in
the characteristic value (or the
hierarchy node).
Copyright 2010 Accenture All Rights Reserved. 41
Key Figure Authorizations
This restriction is used to grant authorization to particular key figures
to the users.
Technical name: 0TCAKYFNM
Possible values:
- Single value (EQ) Exactly one key figure
- Range (BT) Selection of key figures
- Pattern (CP) Selection of key figures based on pattern
Note: If a particular key figure is defined as authorization-relevant, it
will be checked for every InfoProvider
Copyright 2010 Accenture All Rights Reserved. 42
Authorizing Navigational
Attributes
To restrict the access to navigational attributes, it should be marked
as authorization-relevant in attribute tab strip.
Note: The referencing characteristic does not need to be
authorization-relevant.
Copyright 2010 Accenture All Rights Reserved. 43
Special Authorization: 0BI_ALL
An authorization for all values of authorization-relevant
characteristics is created automatically in the system. It
has the name 0BI_ALL. It can be viewed, but not changed.
Every user that receives this authorization can access all
the data at any time. Each time an Info Object is activated
and the property authorization relevant is changed for the
characteristic or a navigation attribute, 0BI_ALL is
automatically adjusted.
A user that has a profile with the authorization object
S_RS_AUTH and has entered 0BI_ALL (or has included
value as *) has complete access to all data.
Copyright 2010 Accenture All Rights Reserved. 44
Minimum Authorization Requirements
for a Reporting User
Analysis authorizations for an InfoProvider
S_RS_COMP (Activities 03, 16)
S_RS_COMP1 (Query owner)
S_RFC (BEx Analyzer or BEx Browser only)
S_TCODE (RRMX for BEx Analyzer)
Copyright 2010 Accenture All Rights Reserved. 45
SAP BI Security
Create Analysis
Authorization
Copyright 2010 Accenture All Rights Reserved. 46
Creation of Analysis Authorization
There are two ways to create the analysis authorization in
BI 7
1. Manual creation of analysis authorization through
RSECAUTH T-code.
2. Automatic generation of analysis authorization
approach (for mass creation and assignment).
Copyright 2010 Accenture All Rights Reserved. 47
Creation through RSECADMIN
1)Execute T-code RSECADMIN
2)Go to Maintenance in Authorization Tab
3)Enter The Analysis Authorization and click Create
Copyright 2010 Accenture All Rights Reserved. 48
Automatic generation of analysis
authorization
With the generation of analysis authorizations, we can load authorized
values from other systems into Data Store objects and generate
authorizations from them. This approach is generally used for mass
creation of analysis authorization and assignment of these authorizations to
the users.
Steps to be performed:
Data Warehouse Workbench (RSA1):
1. Activate Business Content
2. Load of Data Store Objects
Management of Analysis Authorizations (RSECADMIN):
3. Generate Authorizations
4. View Generation Log
Copyright 2010 Accenture All Rights Reserved. 49
Activate Business Content
There are five Data Store Objects delivered with Business Content
that serve as templates:
0TCA_DS01 Authorization data Values
0TCA_DS02 Authorization data Hierarchies
0TCA_DS03 Descriptive Text Authorizations
0TCA_DS04 Assignment User Authorizations
0TCA_DS05 Generate users for Authorizations
Copyright 2010 Accenture All Rights Reserved. 50
Load of Data Store Objects
Fill the Data Store objects with the user data and authorizations
Extract the data, for example, from an SAP R/3 source system or
from a flat file
Note: Some consistency checks should be added to avoid errors
during the generation later
Copyright 2010 Accenture All Rights Reserved. 51
Generate Authorizations
Start the generation by specifying the relevant DataStore
objects
Copyright 2010 Accenture All Rights Reserved. 52
View Generation Log
Detailed log can be viewed once the generation is completed
Copyright 2010 Accenture All Rights Reserved. 53
SAP BI Security
Assign Analysis
Authorization
Copyright 2010 Accenture All Rights Reserved. 54
Assignment of authorization
Direct assignment of Analysis authorization through
RSECADMIN
Indirect assignment through Roles (PFCG)
Copyright 2010 Accenture All Rights Reserved. 55
Direct assignment
Direct assignment of Analysis authorization through RSECADMIN
Copyright 2010 Accenture All Rights Reserved. 56
Pros and Cons
Analysis authorization based Approach:
Pros:
This approach removes the use of creating Roles for the
corresponding analysis authorization .
Cons:
No Change documents are provided by SAP for assigning and
removal of Analysis authorization from the user
No SUIM (System User Information Management) reports are
provided by SAP for analysis authorization
No possible way to assign mass analysis authorization to the users at
a stretch.
Copyright 2010 Accenture All Rights Reserved. 57
Contd..
If an id is deleted using SU01 who is having analysis authorization
assigned to it, these authorization will not get deleted from the users
profile. If the same id is recreated, automatically user id will be
populated with the earlier analysis authorizations.
So if this approach is followed, it is always recommended that analysis
authorization are manually deleted from the user id using RSU01 and then
id using SU01
Copyright 2010 Accenture All Rights Reserved. 58
Indirect Assignment
Alternatively to the direct assignment, we can also assign
authorizations to roles, which can then be assigned to users.
Use authorization object S_RS_AUTH for the assignment of
authorizations to roles
Maintain the authorizations as values for field BIAUTH
Copyright 2010 Accenture All Rights Reserved. 59
Pros and Cons
Indirect Assignment Approach
Pros:
All the Change documents are already available.
All the existing SUIM reports are already available.
Possible to perform mass assign role assignment.
Cons:
Roles need to be created corresponding to the analysis authorization
which will include more maintenance in the system.
Copyright 2010 Accenture All Rights Reserved. 60
Exercise
Add Analysis
Authorizations to
user profile
Copyright 2010 Accenture All Rights Reserved. 61
SAP BI Security
Monitoring Analysis
Authorizations
Copyright 2010 Accenture All Rights Reserved. 62
Using the Trace
There are two primary transaction codes that can be used to trace
authorizations: ST01 and RSECADMIN.
Transaction code ST01 is a system trace that is used for SAP-
provided objects.
Transaction code RSECADMIN is specific to BI and only traces the
custom analysis authorizations you create to control access to
InfoObject values. This trace can be very helpful when you need to
debug an authorization error.
Copyright 2010 Accenture All Rights Reserved. 63
Authorization Monitoring
Checking Authorizations
Log on with your own user ID (production support role)
Check query execution with the authorizations of a specific user
Copyright 2010 Accenture All Rights Reserved. 64
Evaluate Log Protocol
Evaluate Log Protocol
Turn on logging of user activities
related to analysis authorizations
View detailed information about
authorization checks
Copyright 2010 Accenture All Rights Reserved. 65
Change log of Analysis
authorization
Activate the following Virtual Providers from the Business Content
(VAL = Values, HIE = Hierarchies, UA = User Assignment)
The system records all changes to authorizations and user
assignments. Queries can be built on these Info Providers to find
out the trace of
- How many users have access to a given InfoCube?
- Which users have access to company code X?
- When was authorization XYZ created, and by whom?
Copyright 2010 Accenture All Rights Reserved. 66
Exercise
Trace the missing
authorizations
Copyright 2010 Accenture All Rights Reserved. 67
Q&A
Copyright 2010 Accenture All Rights Reserved. 68