Previous Topic: Multi-Homed EnvironmentNext Topic: Authentication


Security

Your organization's security policies affect how you deploy BusinessObjects Enterprise on your network. Do you plan to use the system's built-in authentication, or do you need it to work with existing LDAP or Windows Active Directory (AD) authentication? You also need to decide how your firewalls are configured, and if you plan to use a reverse proxy.

To protect against unauthorized access, the BusinessObjects Enterprise architecture supports features such as: SSL encryption, reverse proxies, single sign-on, resource access security, object rights, and LDAP or Windows AD authentication.

Additional information about security can be found in the BusinessObjects Enterprise Administrator’s Guide.

More information:

Firewalls