Security From The Trenches

Slides:



Advertisements
Similar presentations
Course name : SAP BO 24*7 technical support faculty : Realtime experience Rs Trainings: is a brand and providing quality online and offline trainings to.
Advertisements

Unveiling ProjectWise V8 XM Edition. ProjectWise V8 XM Edition An integrated system of collaboration servers that enable your AEC project teams, your.
File Server Organization and Best Practices IT Partners June, 02, 2010.
Lesson 17: Configuring Security Policies
SharePoint 2010 Permissions Keith Tuomi. profile KEITH TUOMI SharePoint Consultant / Developer at itgroove Developing Online Systems since years.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
MIS Chapter 51 Chapter 5 – Managing File Access MIS 431 Created Spring 2006.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 18: Configuring Application Restriction Policies
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Group Accounts; Securing Resources with Permissions
EBO Overview Part 1 Ingrid Bongers MT(ASCP) MBA eClinicalWorks Certified Trainer.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
ManageEngine ADAudit Plus A detailed walkthrough.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
Chapter 5 File and Printer Services
Corso referenti S.I.R.A. – Modulo 2 07 – Group Policy 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
Chapter 7: WORKING WITH GROUPS
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Systems Module Slide 2 – Overview and Navigation
Module 4 Managing Access to Resources in Active Directory ® Domain Services.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Chapter 9: SHARING FILE SYSTEM RESOURCES1 CHAPTER OVERVIEW  Create and manage file system shares and work with share permissions.  Use NTFS file system.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 4: Managing Recipients. Overview Introduction to Exchange Recipients Creating, Deleting, and Modifying Users and Contacts Managing Mailboxes Managing.
Module 3: Configuring File Access and Printers on Windows 7 Clients
Chapter 8 Configuring and Managing Shared Folder Security.
Page 1 NTFS and Share Permissions Lecture 6 Hassan Shuja 10/26/2004.
Module 5: Managing Access to Objects in Organizational Units.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
Configuring and Managing Resource Access Lecture 5.
29 Copyright © 2009, Oracle. All rights reserved. Administering the Oracle Business Intelligence Presentation Catalog.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
Lesson 14: Configuring File and Folder Access MOAC : Configuring Windows 8.1.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Working in the Forms Developer Environment
Lesson 4: Configuring File and Share Access
Module 4: Managing Access to Resources
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
Common Security Mistakes
Self Service BusinessObjects Administration
Team Site Admin with SharePoint 2010
SAP BUSINESS OBJECTS WEB INTELLIGENCE RICH CLIENT
Sap BusinessObjects Universe Design with Information Design Tool
Managing Data by Using NTFS
BusinessObjects 4.2 SP3 What's new for System Administration in CMC
Security Schedule: Timing Topic 40 minutes Lecture 70 minutes Practice
Managing Data by Using NTFS
Basics to Know and Best Practices to Do
Chapter 9: Managing Groups, Folders, Files, and Object Security
敦群數位科技有限公司(vanGene Digital Inc.) 游家德(Jade Yu.)
Planning a Group Policy Management and Implementation Strategy
Introducing NTFS Reliability Security Long file names Efficiency
Presentation transcript:

Security From The Trenches InfoSol, Inc. - Amy O’Neel

Security From the Trenches Security 101 – Precedence and Inheritance Security 102 – Application Rights Object only vs Object and Objects Within 4.x Changes Information Design Tool Security Profiles Auditing Security Infosol 2017

Security 101 © InfoSol 2017

Security 101 Denied > Granted > No Access Explicit Settings vs Group Settings Inherited unless Inheritance Broken

Explicit Settings "If a right is explicitly set on a child object that contradicts the rights inherited from the parent object, the right set on the child object overrides the inherited rights. This exception applies to users who are members of groups as well. If a user is explicitly granted a right that the user's group is denied, the right set on the user overrides the inherited rights."

Let’s have a look…. http://vm3.infosol.com:8080/BOE/CMC

Security 102 Application Rights vs Content Rights Sometimes it takes a combination

Security 102 Example - Inboxes Application Settings: 'Send' button 'BI launch pad':  - 'Send to BO Inbox'  - 'Send to email destination'  - 'Send to file location'  - 'Send to FTP location'  - 'Organize'  Copy Object (on from Folder) Add Objects to the Folder (on Inboxes) View Users (to select Users) 'Web Intelligence':  - 'Desktop interface - send by mail'  - 'Documents - enable publish and manage content as web service' 

On Object Only vs On Object and Sub Objects (View at Top Level) © InfoSol 2017

Favorites In 3.x Users were set with principle rights on their own personal folder. In 4.x User has Everyone group right on their own personal folder Full Control vs View Object Only + Full Control (Owner)

Object Only Setting – View Object Only CMC tabs w/ top-level folders Access Levels Calendars Categories (Universe) Connections Cryptographic Keys Events Federations Folders Inboxes OLAP Connection Personal Categories Personal Folders Profiles Replication Lists Servers and Groups Temporary Storage Universes Users and Groups Web Service Query

Let’s have a look…. http://vm3.infosol.com:8080/BOE/CMC

4.x Changes © InfoSol 2017

Removed or Renamed Removed Renamed Enable drill mode Interactive: Hide/Show Toolbars Renamed Create document to Documents – enable creation …..and many more Rule of Thumb – Redo security settings

Drill Mode Requires Edit Query in 4.x if drilling out of scope From the Trenches 4.2 SP4 more secure SSL SSL – Regenerate certificate (new encryptions, key strength 2048+, enable FIPS Disable SSL for Upgrade Manager Drill Mode Requires Edit Query in 4.x if drilling out of scope Input Control Selection Requires Reporting – enable formatting in 4.x “Your security profile does not include permission to edit this document (WIS 30252)” ….. Additional work with CUSTOMIZATIONS if you do not want them to be able to edit -Hide Design Mode Toolbar -Hide Application Mode Buttons

From the Trenches Administrators Group: For improved security, only members of the Administrators group can access system configuration wizard. Only users who are part of the default Administrators group can add users in bulk. This feature is not supported for delegated admins. When users are added to the Administrators group, they do not inherit the rights required to perform management tasks on cryptographic keys. (Need to be Cryptographic Officers grp)

Administrators Group CMC tabs Auditing Authentications Cryptographic Keys License Keys Monitoring Sessions Settings User Attribute Management Only members of the Administrators group can change management settings, unless a user is explicitly granted rights to do so.

Information Design Tool Security Profiles © InfoSol 2017

Avoid the Refresh Error “You do not have sufficient rights to refresh the query” Secret: Allow Data AND Display Objects

Let’s have a look…. (If there’s time…..)

Set up security in IDT - Universe Information Design Tool Security Builder ROWS tab Assign Data Security Profile to a User Group In the security builder of the Information Design Tool, Insert a Data Security Profile for your required universe Add a Rows security restriction on the Customers table In our Example its SI_Country, assign this security to an appropriate group, you can do this for ‘Everyone’, and save your universe.

Information Design Tool Speaking of System Variables… © InfoSol 2017

IBIS 2009 -- June 14 - 17 -- Lake Las Vegas System Variables The built-in @Variables for XI 3.1 are BOUSER, DBUSER, DBPASS, DOCNAME, DPNAME, DPTYPE, UNVNAME, and UNVID XI 3.1 SP2 added DOMINANT_PREFERRED_VIEWING_LOCALE, PREFERRED_VIEWING_LOCALE XI 4.x added DOCID and removed DBPASS … And added User Defined Attributes IBIS 2009 -- June 14 - 17 -- Lake Las Vegas

IBIS 2009 -- June 14 - 17 -- Lake Las Vegas System Variables Use @variable() in SELECT - to display user on report WHERE – to filter results by user END_SQL – to track users and documents running queries in database logging ConnectInit in custom connection parameters SET QUERY_BAND = 'ApplicationName=YourAppHere; ClientUser=@variable('BOUSER');' FOR TRANSACTION (or SESSION) ; BEGIN_SQL SET QUERY_BAND='USER='@Variable('BOUSER'); Document='@Variable('DPNAME')';' for transaction; IBIS 2009 -- June 14 - 17 -- Lake Las Vegas

BOUser in @Execute Personalized, Multiple Values LOV Data Foundation LOV, “BOUserCustomer” SELECT distinct Customer.Last_Name FROM Customer, Employee, Orders WHERE Employee.Last_Name = @variable('BOUSER') and Customer.Customer_ID = Orders.Customer_ID and Orders.SalesPerson_ID=Employee.Emp_ID Table filter Customer.Last_Name in @Execute(BOUserCustomer)

Auditing Security © InfoSol 2017

How to Visualize a MATRIX? The Matrix GROUPS AND SUB GROUPS Denied > Granted > No Access Explicit Settings vs Group Settings Inherited unless Inheritance Broken FOLDERS and SUB FOLDERS How to Visualize a MATRIX?

3rd Party Tools 360View

3rd Party Tools 360Eyes

IBIS 2018 Open for Registration The Premier BusinessObjects Education & Knowledge Exchange Event of the Year! June 18- 20 | Park Hyatt Aviara Carlsbad, CA AttendIBIS.com ALL INCLUSIVE (HOTEL/FOOD/CONFERENCE) HANDS-ON TRAINING Organized in modules to allow for jumping between tracks as needed. https://www.youtube.com/watch?time_continue=15&v=h8yYTLUqoXM

Session: QUESTIONS??? Amy O’Neel aoneel@infosol.com text BOUG17 to 623-552-2272 to receive the slides from this presentation IBIS 2009 - June 14-17 - Lake Las Vegas