How to Design a Successful SAP BusinessObjects BI 4.x platform: Q&A on Security and Authentication

February 25, 2016

Security is typically a top concern for any company that leverages business intelligence. As organizations migrate to SAP BusinessObjects Business Intelligence (BI) 4.x, there are various considerations regarding system security and user authentication.

In this live Q&A on February 25, Martin Macmaster, Principal Consultant at Xoomworks, answered questions on how to set up and manage authentications and best practices for user login issues. He discussed the different security models supported by SAP BusinessObjects BI 4.x and how to design the best platform for your business. Many questions were answered, such as:

  • How can we configure a single tomcat to serve multiple SSO types?
  • What are some of the road blocks when you have multiple business warehouse (BW) systems in a single BI system?
  • What can be the potential downfalls when a user has accounts across multiple portals that link to BI?
  • How can we still have a common security model when serving several business areas each with their own requirements?
  • How can a security model have an impact on licensing costs?

Sign in to check out the chat replay from this discussion and read the full, edited transcript.

Sponsored by Xoomworks

Enter your email to view this Q&A:


An email has been sent to:

More from SAPinsider


Please log in to post a comment.

No comments have been submitted on this article. Be the first to comment!