Bookshelf Home | Contents | Index | Search | PDF |
Siebel Analytics Installation and Configuration Guide > Applications User Authentication and Security Setup > Introduction to Security >
Levels of Security
For Siebel Analytics, two different levels of security configuration are supported, Object Level Security and Data-level Security.
Object Level Security
Object level security controls access to various Analytics objects, primarily metadata and Web Catalog objects.
- Metadata objects (repository) security:
Controls access to metadata objects such as subject areas, tables and columns. See Metadata Object Level—Repository Groups.
- Web Catalog objects (Web client) security:
Controls access to dashboards, pages, folders and reports. See Metadata Object Level—Web Catalog Groups.
Data-Level Security
Data-level security controls the content that appears in the end-user objects, such as dashboard reports and figures. When two different users run the same report, they see different data, depending on their access.
There are four types of data-level security:
- Primary position based:
Equivalent to the Siebel eBusiness application My Teams view. This type of security implies that the user sees all data where the user's position is the primary position on that record, or when the user is the manager of a position who is primary on the record.
- Primary organization based:
The Siebel operational application view equivalent is My Organization's Records. In this case the user sees all data where the user's organization owns the record or an organization that reports to the user's organization owns the record.
- Primary owner based:
This gives a subset of the Siebel operational application view equivalent of My Records. In this case the user sees data where the user is the primary owner of the record (for example, Activities). The Siebel operational application equivalent view also includes records where the user is on the team for that record.
- Team based:
This is the most complicated of security configuration and is not preconfigured in the metadata. However, the Data Warehouse tables to support this configuration are part of the schema. Organizations that wish to use this configuration must set up the metadata appropriately.
In this configuration, the user sees the records where the user is on the team for that record or all data that is accessible under the first three security level types. There is no equivalent Siebel operational application view for this security, and the data is a combination of data seen in multiple Siebel views.
Bookshelf Home | Contents | Index | Search | PDF |
Siebel Analytics Installation and Configuration Guide, Version 7.5, Rev. C Published: 18 April 2003 |