Hi All,
We are in the process of implementing BOBJ in my company. Currently we are presented with two Security design solutions for the data security element and wanted to reach out to others who have worked on BOBJ secuirty to understand what would be the best solution. I would be grateful if you can provide your thoughts on which solution below works best?
Solution 1 - is to build dummy roles in BW system which will be imported into BOBJ as user groups. These dummy roles will be coupled with roles that consist of analysis authorisations which would provide the relevant data to users in the respective user group.
Solution 2 - To build analysis authorisation roles in BW system which will be imported as user groups into BOBJ, A user maybe assigned to one or more roles depending on the user groups they would need to sit in and the data they would need to view.
If you feel that there is a better solution then please feel free to provide your suggestions.
I look forward to hearing from you soon.
Laav