When a reviewer runs an iConsole report, the reviewer's security model gets applied to the report. This ensures that the report only include events that the reviewer is permitted to see. All CA DataMinder users have a security model assigned to them.
But when a reviewer runs a BusinessObjects report for CA DataMinder, a BusinessObjects user runs the report. CA DataMinder therefore needs to map the correct security model to the BusinessObjects user. This section describes how CA DataMinder and BusinessObjects Enterprise interact to ensure that BusinessObjects reports always contain the correct information.
How do CA DataMinder and BusinessObjects Enterprise interact to generate reports?
This logon is normally automatic. However, your reviewers may have to enter their BusinessObjects user name and password when they first run a BusinessObjects report. This requirement to enter BusinessObjects credentials depends on the method used to map CA DataMinder reviewers to BusinessObjects accounts and whether Trusted Authentication is enabled between BusinessObjects Enterprise and the iConsole.
Specifically, CA DataMinder runs a stored procedure to map the reviewer's BusinessObjects account back to their CA DataMinder account.
Security models ensure that reviewers can only see events they are permitted to see when running CA DataMinder reports, including BusinessObjects reports for CA DataMinder. See the Database Guide for details about security models.
In effect, CA DataMinder applies the reviewer's security model to the BusinessObjects report.
The reviewer's security model ensures that the report only include events that the reviewer is permitted to see.
BusinessObjects Enterprise then displays the report in InfoView
Copyright © 2014 CA.
All rights reserved.
|
|