<< Click to Display Table of Contents >> SAP BW Security Policy |
![]() ![]() ![]() |
The product leverages all of the security policies that have been implemented in the SAP BW server. All user authentication and authorization in the data source is performed by SAP BW. The product passes the credentials to the SAP BW system for authentication. After authentication, you will only see objects and data with access rights for users on the SAP BW system.