In this chapter, we talked about the security model applied inside the SAP BO IDT and we learned that by default any user will be able to access all objects, folders, and data that can be retrieved from the assigned Universe. We also received an introduction about the importance of managing our Universe security.
After that, we learned how to use the Security Editor to create Data and Business Security Profiles and how to configure restriction rules inside each security profile type.
Finally, we discussed the importance of a security matrix and how this can help us to build the right security profiles and assign it to the right people.
In the next chapter, we will learn how to share Universe resources among Universe designers by utilizing ...