SAP BW Security Policy

<< Click to Display Table of Contents >>

Current:  Create Connection > Docking Instructions for Multi Dimension Connection 

SAP BW Security Policy

Previous pageReturn to chapter overviewNext page

The product leverages all of the security policies that have been implemented in the SAP BW server. All user authentication and authorization in the data source is performed by SAP BW. The product passes the credentials to the SAP BW system for authentication. After authentication, you will only see objects and data with access rights for users on the SAP BW system.