O'Reilly logo

Creating Universes with SAP BusinessObjects by Taha M. Mahmoud

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The security matrix

A security matrix is a mapping between users and profiles. We use a security matrix as the first step to defining what kind of restriction rule will be created and to whom it should be assigned. This is one of the best practices because it will give a single place to document and manage the security profiles.

We can have only one security matrix mapping that shows the relationship between users and profiles or we can even make it more detailed by breaking this relationship into two matrices. The first one will show the mapping between profiles and restriction rules, while the other one will show the relation between the users and profiles.

The following is a sample security matrix:

User/Profile

Profile # 1

Profile # 2

Profile ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required