Security Administration

This page provides Information on how the security is handled and configured for Business Reporting & Analysis Data Sources for Lobby.

Overview

To design a Lobby using Business Reporting & Analysis data sources, the following activities should be granted to the end user:

  1. BrowseStarSchemaMetaData
  2. ExecuteStarSchema .

To execute Lobby Pages that are using Business Reporting & Analysis data sources, the following activities should be granted to the end user:

 

Information Sources

Standard Information Source Security applies when accessing Information Sources through a Lobby. For more info, please refer to Grant Access to an Information Source.

 

Cubes

Only SQL Server Analysis Services (SSAS) Cubes are supported from Lobby. Since SSAS only supports Windows Integrated Authentication, connecting to SSAS requires a windows domain user and a password. This information is specified when installing IFS Applications.

All the SSAS connections are made using the domain user account specified during the installation. When SSAS is accessed, these connections will be added to a pool based on the Connection Pool Parameters specified during the Installation. After the connection is made, an impersonation will be made to SSAS, using the mapped domain user for IFS Applications User.

Read more about impersonation of SSAS connections using EffectiveUserName property of SSAS connection strings from Microsoft Developer Network.

How SSAS connections are made

Windows Domain User mappings of IFS Applications Users for SSAS connections

The way Domain User mapping is done will be different based on the IFS Applications Authentication Method.

DB Authentication

Mappings of Oracle and Domain Users will be used. For more info, please refer to:

LDAP

Directory ID will be used.

Windows Integrated Authentication

Directory ID will be used.