When a reviewer runs an iConsole report, the reviewer's security model gets applied to the report. This ensures that the report only include events that the reviewer is permitted to see. All CA DLP users have a security model assigned to them.
But when a reviewer runs a BusinessObjects report for CA DLP, a BusinessObjects user runs the report. CA DLP therefore needs to map the correct security model to the BusinessObjects user. This section describes how CA DLP and BusinessObjects Enterprise interact to ensure that BusinessObjects reports always contain the correct information.
How do CA DLP and BusinessObjects Enterprise interact to generate reports?
This logon is normally automatic. However, your reviewers may have to enter their BusinessObjects user name and password when they first run a BusinessObjects report. This requirement to enter BusinessObjects credentials depends on the method used to map CA DLP reviewers to BusinessObjects accounts and whether Trusted Authentication is enabled between BusinessObjects Enterprise and the iConsole.
Specifically, CA DLP runs a stored procedure to map the reviewer's BusinessObjects account back to their CA DLP account.
Security models ensure that reviewers can only see events they are permitted to see when running CA DLP reports, including BusinessObjects reports for CA DLP. See the Database Guide for details about security models.
In effect, CA DLP applies the reviewer's security model to the BusinessObjects report.
The reviewer's security model ensures that the report only include events that the reviewer is permitted to see.
BusinessObjects Enterprise then displays the report in InfoView
|
Copyright © 2012 CA.
All rights reserved.
|
|