Authorizations ASAP FOR BW ACCELERATOR BUSINESS INFORMATION WAREHOUSE Methodology on how to analyse and design authorizations. (Description) Document Version 1.0 SAP (SAP America, Inc. and SAP AG) assumes no responsibility for errors or omissions in these materials. These materials are provided “as is” without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP shall not be liable for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. SAP does not warrant the accuracy or completeness of the information, text, graphics, links or other items contained within these materials. SAP has no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third party web pages nor provide any warranty whatsoever relating to third party web pages. AUTHORIZATIONS Table of Contents 1 INTRODUCTION ........................................................................................................... 3 2 GUIDELINES ................................................................................................................. 3 3 MACROROLES ............................................................................................................. 3 4 AUTHORIZATION SPECIFICATION AND DESIGN TASKS DURING THE BW PROJECT ...................................................................................................................... 4 4.1 BUSINESS BLUEPRINT ................................................................................................. 4 4.2 REALIZATION............................................................................................................. 4 4.3 FINAL PREPARATION .................................................................................................. 4 5 AUTHORIZATION REQUIREMENT COLLECTION APPROACH ................................. 6 5.1 5.2 5.3 6 INFOCUBE BASED APPROACH ..................................................................................... QUERY NAME BASED APPROACH ................................................................................. INFOCUBE INDEPENDENT DATASET APPROACH............................................................. 6 6 6 THE AUTHORIZATION ACCELERATOR...................................................................... 7 1998 SAP AMERICA, INC. AND SAP AG TABLE OF CONTENTS AUTHORIZATIONS 1 Introduction In this paper we describe a project approach for the BW authorization requirements collection and for the corresponding and strictly linked authorization design and implementation. 2 Guidelines Start to consider the authorization requirements as soon as possible during the project. Keep the requirements as simple as possible. Complex authorization requirements imply complex authorization design and some administration workload for the authorization maintenance. Develop an authorization strategy. Establish appropriate name ranges. 3 MacroRoles We can identify several categories of BW users. From now on these categories will be called “MacroRoles”. For each MacroRole there‘s a standard template to be used. Anyway here we discuss more in depth the reporting users, because their requirements are customer specific and they need to be collected in a structured way during the project. At a rough level we can identify the following MacroRoles (at the right you can find the corresponding BW standard template to be used as a starting point): MACROROLE BASIC TEMPLATE BW DATA MODELER S_RS_RDEMO BW SYSTEM ADMINISTRATOR(S) Administrator of development system S_RS_RDEAD Administrator of productive system S_RS_ROPAD Operator of productive S_RS_ROPOP system (for monitoring and loading) BW REPORTING DEVELOPER S_RS_RREDE BW REPORTING USER S_RS_RREPU PAGE 3 OF 7 AUTHORIZATIONS 4 Authorization specification and design tasks during the BW project Here we describe which are the authorization linked tasks in the different ASAP for BW phases. In figures 4.1 and 4.2 you can find a summary of these tasks. 4.1 Business Blueprint During the Business Blueprint phase there are three tasks concerning authorizations: Role identification. For example you identify “accounting manager” and “sale responsible” as two significant roles in your BW project. First identification of the authorization relevant characteristics. Before the final data model design and for each role, you can collect some needed limitations on data access such as “the sale responsible can see only his own sales area data”. These two aspects are covered in the PI-Documentation-Paper which is a template for the Business Blueprinting. (Please check for existing Accelerator). 4.2 Definition of an authorization strategy. You have to identify a consistent approach to authorization requirement collection and you have to choose which level of detail is needed and which level of administration workload you can support. In paragraph 5 we describe more in depth some possible approaches. Realization In parallel to data model implementation you can start one after the other the following tasks: the detail authorization requirements collection; the authorization design (reporting object, authorization and profiles design); the authorization implementation. 4.3 Final preparation During the final preparation you have to test the authorizations for the initial set of queries. PAGE 4 OF 7 AUTHORIZATIONS FIG. 1 – maps of authorization related tasks Role identification, first requirements Strategy Authorization requirements collection BW authorization requiremets collection Authorization design template (with suggested design rules) for authorizations Implementation Test FIG. 2 – authorization tasks and templates in the ASAP for BW Roadmap Phase Tasks Template Project preparation Business Blueprint Realization Role identification First identification of the authorization relevant characteristics PI-Documentation Template allows you to add also access restrictions to characteristics relevant for each role. Definition of an authorization strategy Please refer to this paper as a guideline and share the approach with the customer. Collection of authorization requirements at the chosen level of detail Authorization requirement and design suggestion template (Excel) Profile design Authorization implementation Final preparation Test of authorizations Go live and support PAGE 5 OF 7 AUTHORIZATIONS 5 Authorization requirement collection approach Here we describe three compatible approaches to collect the authorization requirements. 5.1 InfoCube based approach You can collect the requirements allowing or not allowing for specific InfoCubes. If it‘s convenient, you can use the concept of InfoArea to allow or not for a group of InfoCubes belonging to the same InfoArea. You can go in a more detail if you limit the accessability of a cube, allowing only for a part of it. We can name dataset the Sub-InfoCube which is limited by the authorizations assigned to a user. In BW a dataset can be defined according to characteristics, key figures, hierarchies and their combinations. 5.2 Query name based approach For pure reporting users (not allowed to build new queries) you can use the query names to simplify the authorization design, creating specific queries for specific roles and allowing only certain query names. The disadvantage of this approach is that there‘s no relationship between query name and set of data, so new queries are potentially security dangers. 5.3 InfoCube independent dataset approach Before the data model you don‘t know the InfoCubes, but you can express authorization requirements through data set, i.e. limitations on to characteristics, key figures, hierarchies and their combinations at various level of detail. PAGE 6 OF 7 AUTHORIZATIONS 6 The authorization accelerator The authorization accelerator (file name „BW authorization requirements template.xls“) allows you to: Collect the authorization requirements for specific roles (one Excel per Reporting User Role) Choose the best authorization approach and modifying consistently the template Choose the right level of detail concerning the complexity of the requirements The accelerator: hides the complexity of the authorization requirement collection if this is not needed links an example for each template sheet. Although it is focused on the requirement specification, for each object (e.g. Infoareas, Infocubes, queries, …) the accelerator gives the corresponding implementation suggestions. Here‘s the initial screen: PAGE 7 OF 7