bouc2008 marks 9015 cmc essentials security

40
7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 1/40 CMC Essentials Dallas Marks, Integra Solutions Breakout Session #9015

Upload: rafael-riso

Post on 13-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 1/40

CMC EssentialsDallas Marks, Integra SolutionsBreakout Session #9015

Page 2: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 2/40

Poll

By a show of hands:

• How many people using version 6.x and earlier?

• Crystal Enterprise 10 and earlier?

• XI R2 in production?

• XI 3.0 in development?

• XI 3.0 in production?

• What about XI 3.1?

Page 3: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 3/40

Agenda

• Brief History of Business Objects Administration

• Comparing XI R2 and XI 3.x Security

• Security Basics

• Terminology

Folder and Group Inheritance• Breaking Inheritance

• Custom Access Levels

• Scope of Rights

• Demonstration

• Custom Access Levels, Permissions Explorer and Security Query

• Best Practices

• Q&A

Page 4: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 4/40

HISTORY OF

ADMINISTRATION

CMC Essentials

Page 5: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 5/40

History of BusinessObjectsAdministration

Supervisor 4.0

March 1996

Central Management

Console XI Release 1

January 2005

Central Management

Console XI Release 2

November 2005

Central Management

Console

XI 3.0 - February 2008

XI 3.1 – 

September 2008

Page 6: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 6/40

Yoda on BusinessObjects XI R2

“You must unlearn what you have learned”

Page 7: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 7/40

Yoda on BusinessObjects XI 3.x

“You must confront BusinessObjects Enterprise XI 3.1.

Then, only then, a Jedi will you be.”

NOTE: There are many new management areas in

the redesigned CMC XI 3.x, but this presentation

focuses on security-related changes.

Page 8: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 8/40

COMPARING XI R2 AND

XI 3 X SECURITY

CMC Essentials

Page 9: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 9/40

Users XI R2 XI 3.x

Administrator yes yes

Guest yes yes

QaaWSServletPrincipal no yes

PMUser yes no

Set Administrator password during install? no yes

Guest user disabled by default? no yes

Groups XI R2 XI 3.x

Administrators yes yes

Everyone yes yes

QaaWS Group Designer no yes

Report Conversion Tool Users yes yes

BusinessObjects NT Users yes no

Universe Designer users yes yes

Translators no yes

Default Users and Groups

Page 10: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 10/40

Feature XI R2 XI 3.xFolder Inheritance yes yes

Group Inheritance yes yes

Predefined Access Levels yes yes

No Access yes yes*

View yes yes

Schedule yes yes

View On Demand yes yes

Full Control yes yes

Advanced Rights yes yes

Custom Access Levels no yes

Break Inheritance yes yesScope of Rights no yes

Combined Access Levels no yes

Security Features

Page 11: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 11/40

Application XI R2 XI 3.xCentral Management Console yes yes!

Web Component Adapter (WCA) yes no

Administrative Launchpad yes no

Query Builder yes yes

Security Viewer Add-on yes no

Security Query no yes

Permissions Explorer no yes

Security Applications

Page 12: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 12/40

SECURITY BASICS

CMC Essentials

Page 13: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 13/40

Terminology

• Principal – a user or group

• Rights override - a rights behavior in which

rights that are set on child objects override

the rights set on parent objects

• General Global Rights – access rightsenforced regardless of content type

• Content Specific Rights – access rights

unique to content type (Crystal Report, Web

Intelligence, etc)

Page 14: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 14/40

Predefined Rights

Rights Option Description XI R2 XI 3.x

No Access Unable to access an object yes

slightly

different

View Able to view historical (scheduled) instances of an object yes yes

Schedule Able to schedule instances of an object yes yes

View on Demand Able to view live data on-demand yes yes

Full Control Able to change or delete an object yes yes

Page 15: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 15/40

Advanced/Granular Rights

Rights Option Description XI R2 XI 3.xGranted The right is granted to a principal. yes yes

Denied The right is denied to a principal. yes yes

Not Specified

The right is unspecified for a principal. By

default, rights set to Not Specified are denied. yes yes

Apply to Object

The right applies to the object. This optionbecomes available when you click Granted or

Denied. no yes

Apply to Sub-Objects

The right applies to sub-objects. This option

becomes available when you click Granted or

Denied. no yes

Page 16: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 16/40

Folder Inheritance

Global Rights

Object

Object

Object

Object

Top Level Folder 

Subfolder 

Subfolder 

NOTE:

In XI R2, global rights are set on the Rights tab

in the Settings management area.

In XI 3.x, global rights are set in the Folders

management area as “All Folders Security”

Page 17: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 17/40

Group Inheritance Rules

eFashion Sales Managers 2008

eFashion East eFashion South eFashion West

Barrett Richards Larry Leonard Bennett Steve

Page 18: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 18/40

Breaking Inheritance

• Still possible in XI 3.x asit was in XI Release 2

• Can disable folder

inheritance, group

inheritance, or both• May not be as

necessary in XI 3.x

because of new scope

of rights features

Page 19: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 19/40

Custom Access Levels

• New Management Area in CMC XI 3.x

• Can create new access levels or copy

existing access levels

• Pre-defined rights (View, Schedule, ViewOn Demand, Full Control) levels cannot

be altered

• Easier to manage than setting Advanced

rights

Page 20: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 20/40

Scope of Rights

• Scope of rights – new in XI 3.x, the ability to limitthe extent of rights inheritance (Apply to Object,

 Apply to Sub-object)

• In BusinessObjects Enterprise XI R2, the

administrator was forced to break inheritance whenthey wanted to give user rights to child folders that

were different to those given to the parent folder 

• In XI 3.x, rights are effective for both the parent

object and the child objects by default (same as XIR2). However…

Page 21: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 21/40

Scope of Rights, cont.

• With BusinessObjects Enterprise XI 3.x, the administrator can nowspecify that a right set on a parent object should apply to that object

only.

Page 22: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 22/40

DEMONSTRATION

CMC Essentials

Page 23: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 23/40

Demonstration

• Custom Access Levels

• Permissions Explorer 

• Security Query

Page 24: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 24/40

Demonstration  – Users & Groups

Page 25: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 25/40

Demonstration  – Folders and Content

Page 26: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 26/40

DEMONSTRATION

CUSTOM ACCESS LEVELS

CMC Essentials

Page 27: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 27/40

Demonstration  – Custom Access Levels

Custom Access Level demo…

Page 28: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 28/40

PERMISSIONS EXPLORER

AND SECURITY QUERY

CMC Essentials

Page 29: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 29/40

Permissions Explorer (object centric) 

• Use the Permissions Explorer to determinethe rights a principal has on an object

• Improvement upon Check User Rights

button in XI Release 2. Check User Rightsonly identified the effective rights – the source

of the rights assignment was still unknown

•  Available from any object (folder, document,

universe, connection, etc.) that can haverights assigned

Page 30: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 30/40

Permissions Explorer 

Permissions Explorer demo…

Page 31: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 31/40

Security Query (User Centric) 

• Use Security Query to determine the objects to which aprincipal has been granted or denied access.

•  Available from Users and Groups or Query Results

Page 32: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 32/40

Security Query  – Query Principal

Query Principal - the user or group that you

want to run the security query for. You can

specify one principal for each security query

Page 33: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 33/40

Security Query  – Query Permission

Query Permission - the right or rights you

want to run the security query for, the status

of these rights, and the object type these

rights are set on

Page 34: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 34/40

Security Query  – Query Context

Query Context - the CMC areas that youwant the security query to search. For each

area, you can choose whether to include

sub-objects in the security query. A security

query can have a maximum of four areas

Security Query demo…

Page 35: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 35/40

BEST PRACTICES

CMC Essentials

Page 36: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 36/40

Security Best PracticesXI R2 only

• Disable Guest account if there is norequirement for anonymous access

• Set global access (Settings

management area) to NO ACCESS,then assign rights at top level folders

Page 37: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 37/40

Security Best PracticesXI R2 or XI 3.x

• Grant rights to groups on folders. Although rights can begranted on individual objects or users, the security model

can become difficult to maintain.

• Use pre-defined rights wherever possible. Understand the

additional complexity that advanced rights can introduce.

•  Avoid breaking inheritance, while understanding it is

sometimes necessary

•  Add multiple users to Administrators group rather than

sharing Administrator user account to improve traceability

• Document and maintain your security structure outside ofthe CMC – MS Excel is a good choice

Page 38: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 38/40

Security Best PracticesXI 3.x

•  Allot time in your upgrade/migration for administrative staffto understand both the new CMC interface/workflows as

well as its new features

• Use custom access levels where you would have

previously resorted to advanced rights.

• Identify opportunities to limit the scope of rights instead of

breaking inheritance

• Take advantage of the Permissions Explorer and Security

Query tools to diagnose and correct security issues

Page 39: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 39/40

For More Information

• BusinessObjects Enterprise Administrator’s Guide• BusinessObjects Enterprise XI 3.0/3.1 Upgrade Guide

• BusinessObjects 5/6 to XI 3.1 Migration Guide

• Business Objects Education

• BusinessObjects Enterprise XI R2: Securing Users and Content (SA210R2)

• BusinessObjects Enterprise XI 3.0/3.1: Administration and Security

(SA210V3.0 or SA210V3.1)

• My Life With Business Objects, a blog

http://dallasmarks.blogspot.com/

• Integra Solutions Library

http://www.IntegraSolutions.net/

Page 40: Bouc2008 Marks 9015 Cmc Essentials Security

7/27/2019 Bouc2008 Marks 9015 Cmc Essentials Security

http://slidepdf.com/reader/full/bouc2008-marks-9015-cmc-essentials-security 40/40

Q&A

• Questions• Dallas Marks, Senior Consultant and Trainer 

Integra Solutions, a business unit of Quorum Business Solutions

• I will repeat questions to ensure everyone can hear 

• Contact information

• Email: [email protected]

• Evaluations

• This was breakout session #9015