When a reviewer runs an iConsole report, the reviewer's security model gets applied to the report. This ensures that the report only include events that the reviewer is permitted to see. All CA Data Protection users have a security model assigned to them.
But when a reviewer runs a BusinessObjects report for CA Data Protection, a BusinessObjects user runs the report. CA Data Protection therefore needs to map the correct security model to the BusinessObjects user. This section describes how CA Data Protection and BusinessObjects Enterprise interact to ensure that BusinessObjects reports always contain the correct information.
How do CA Data Protection and BusinessObjects Enterprise interact to generate reports?
This logon is normally automatic. However, your reviewers may have to enter their BusinessObjects user name and password when they first run a BusinessObjects report. This requirement to enter BusinessObjects credentials depends on the method used to map CA Data Protection reviewers to BusinessObjects accounts and whether Trusted Authentication is enabled between BusinessObjects Enterprise and the iConsole.
Specifically, CA Data Protection runs a stored procedure to map the reviewer's BusinessObjects account back to their CA Data Protection account.
Security models ensure that reviewers can only see events they are permitted to see when running CA Data Protection reports, including BusinessObjects reports for CA Data Protection. See the Database Guide for details about security models.
In effect, CA Data Protection applies the reviewer's security model to the BusinessObjects report.
The reviewer's security model ensures that the report only include events that the reviewer is permitted to see.
BusinessObjects Enterprise then displays the report in InfoView
Copyright © 2015 CA Technologies.
All rights reserved.
|
|