Your organization's security policies affect how you deploy BusinessObjects Enterprise on your network. Do you plan to use the system's built-in authentication, or do you need it to work with existing LDAP or Windows Active Directory (AD) authentication? You also need to decide how your firewalls are configured, and if you plan to use a reverse proxy.
To protect against unauthorized access, the BusinessObjects Enterprise architecture supports features such as: SSL encryption, reverse proxies, single sign-on, resource access security, object rights, and LDAP or Windows AD authentication.
Additional information about security can be found in the BusinessObjects Enterprise Administrator’s Guide.
|
Copyright © 2010 CA.
All rights reserved.
|
|