Technology Blogs by Members
Explore a vibrant mix of technical expertise, industry insights, and tech buzz in member blogs covering SAP products, technology, and events. Get in the mix!
Showing results for 
Search instead for 
Did you mean: 
Active Contributor

Designing security model is one among the important phase in BusinessObjects implementation/migration projects. Well-organized security model not only provides easier Administration but also ensures security is seamlessly implemented across different functional/application user groups with less maintenance effort.

From this blog on wards, we are going to see how to design and implement the security model. Before starting the design, we should consider the below things

Various rights categories (as on BI 4.0 SP3)

There are 4 different rights categories as we already aware and they listed below

  • General
  • Application
  • Content
  • System

I have consolidated all of them and the same is depicted below

Various user categories

Always categorize users based on Application as well as functionality (what they can do). I have categorized users based on their BusinessObjects Application/content and their functionality on BI content

Application wise user category

User category


Crystal users

Crystal report users

WebI users

Web Intelligence report users

Dashboard users

Xcelcius dashboard users

Design Studio Users

Design Studio dashboard users

Universe/Information designers

Universe Designers

Analysis users

Analysis Application users

Explorer users

Explorer application users

Mobile users

Mobile report users

Functional user category

User category


BOE Users

All users of the BusinessObjects system


Users who can only view/refresh the reports

Interactive Analysts

Analysts can refresh/create/modify the reports that they create and they cannot create/modify the corporate reports

Interactive Authors

Analysts can refresh/create/modify the corporate reports

Super Users/Managers

Users who can manage and maintain document as well as users for a particular application/department

Content Schedulers

Users who can schedule reports for their own and on behalf of others

Content Promoters

Users who can migrate/promote BI content across different environments

Delegated administrators

Users who can administrate the Businessobjects deployment as a whole or part of it

Based on the rights and user categorizations we are going to see more about the security model design in my upcoming blogs! Thanks for reading!

Related blogs

BusinessObjects Administration - Setting up security model – Part II

BusinessObjects Administration - Setting up security model – Part III

Labels in this area