Securing the System
Encode QR Code In Java
Using Barcode creation for Java Control to generate, create QR Code image in Java applications.
Decoding QR In Java
Using Barcode decoder for Java Control to read, scan read, scan image in Java applications.
Bar Code Printer In Java
Using Barcode generation for Java Control to generate, create bar code image in Java applications.
Read Barcode In Java
Using Barcode reader for Java Control to read, scan read, scan image in Java applications.
Refers to the department or group of users
Generating Denso QR Bar Code In C#
Using Barcode generation for VS .NET Control to generate, create QR Code ISO/IEC18004 image in Visual Studio .NET applications.
QR Code ISO/IEC18004 Generator In Visual Studio .NET
Using Barcode printer for ASP.NET Control to generate, create QR Code JIS X 0510 image in ASP.NET applications.
Refers to the Marketing folder
Creating QR Code ISO/IEC18004 In Visual Studio .NET
Using Barcode printer for Visual Studio .NET Control to generate, create Quick Response Code image in .NET applications.
Drawing QR Code JIS X 0510 In VB.NET
Using Barcode creation for Visual Studio .NET Control to generate, create QR Code image in .NET applications.
6 From the list of available groups, select the Marketing group 7 Click the > button to add this to the list of groups with an explicit access level 8 Click OK 9 From the Access Level drop-down box for the Marketing group, change the access level from the default of Schedule to Full Control 10 Click Update 11 Your Rights should now appear as follows:
Print 2D Barcode In Java
Using Barcode printer for Java Control to generate, create 2D Barcode image in Java applications.
EAN / UCC - 13 Encoder In Java
Using Barcode creator for Java Control to generate, create European Article Number 13 image in Java applications.
If you want to grant access by categories, you follow a similar process
UPC-A Supplement 2 Drawer In Java
Using Barcode maker for Java Control to generate, create GTIN - 12 image in Java applications.
Generating GTIN - 128 In Java
Using Barcode generation for Java Control to generate, create GTIN - 128 image in Java applications.
Drawing Leitcode In Java
Using Barcode generator for Java Control to generate, create Leitcode image in Java applications.
Barcode Maker In Java
Using Barcode encoder for Eclipse BIRT Control to generate, create barcode image in BIRT applications.
A Better Universe
Bar Code Generation In Objective-C
Using Barcode printer for iPhone Control to generate, create barcode image in iPhone applications.
Scanning USS Code 128 In None
Using Barcode decoder for Software Control to read, scan read, scan image in Software applications.
UCC.EAN - 128 Printer In None
Using Barcode creator for Microsoft Word Control to generate, create EAN128 image in Microsoft Word applications.
UCC-128 Generator In None
Using Barcode generation for Online Control to generate, create UCC-128 image in Online applications.
With users belonging to different groups and with inherited and explicit access, rights may overlap with unintended consequences The CMC provides a tool that allows you to clearly check the rights for groups and individual users To use the scenarios from Tables 13-3 and 13-4, you want to ensure that the user Sam can save reports (Full Control) to the Orders folder The user Megan belongs to the Marketing group and should only be able to refresh reports in this folder (View On Demand) 1 From the Home page of the CMC, select Folders, Orders, and then the Rights tab 2 Click Check User Rights 3 From the Choose From drop-down, select Users 4 If your deployment contains a large list of users, use the Look For box to enter some search text and click Find Now Otherwise, scroll through the list of Available Users until you reach the desired user, in this case Sam, and click Show Rights to view the dialog shown in Figure 13-3
Encode Code 39 In Objective-C
Using Barcode creation for iPad Control to generate, create Code 39 Full ASCII image in iPad applications.
2D Barcode Drawer In Visual Studio .NET
Using Barcode generation for ASP.NET Control to generate, create Matrix 2D Barcode image in ASP.NET applications.
As shown in Figure 13-3, Check User Rights allows you to see the individual capabilities that are given within the access levels The table is broken into multiple section parts: General permissions that relate to any BI content, including Excel documents the user may upload or that apply to Crystal Reports, Web Intelligence, and OLAP Intelligence documents Desktop Intelligence Addin for VBA Desktop Intelligence Document permissions that relate to this document type Desktop Intelligence Template for Desktop Intelligence templates Report, which relates to Crystal Report specific permissions Text, which provides access to BusinessObjects XI collaboration capabilities Web Intelligence, which relates to the ability to refresh a document, see the SQL, or export the data for Web Intelligence documents
Securing the System
FIGURE 13-3 The Check User Rights feature allows you to see explicit and inherited rights at a more granular level than access levels
A Better Universe
NOTE Default rights to all modules within BusinessObjects XI are set in the CMC by selecting
Manage, BusinessObjects Enterprise Applications, and modifying rights assigned to the group Everyone for each application
Centralized or Decentralized Security: Who s My Supervisor
Companies either centralize IT access or decentralize it by department, business unit, or function Increasingly, user authentication is centralized, while authorization, or granting access to specific BI content, is decentralized BusinessObjects 6 and earlier used a profile of Supervisor to allow you to decentralize security, either for authentication or authorization The Supervisor profile per se no longer exists in XI; however, the capabilities to decentralize administration do For the sake of clarity, I will continue to use the term Supervisor If you wish to allow individual work groups to control access to their BI content (which in my opinion, they should be able to), then you need to designate Supervisors You must also determine if these Supervisors should also be able to reset passwords or create new users The desire to grant these capabilities is highly dependent upon whether you are using external authentication or internal Enterprise authentication
NOTE In earlier versions of BusinessObjects, a Supervisor could add existing users to a group; in
BusinessObjects XI, you must explicitly decide if such administrators should be able to change rights only for users they ve added to the system or for any user defined in the CMC I would recommend the latter approach Also, in BusinessObjects XI, all users are created at the top level and cannot be created just within a group