In this chapter, we will talk about how to secure your Universe. As we discussed in Chapter 2, Aligning BI Solutions with Business Demands, BI makes the right data available for the right people at the right time. However, it is not just a question of making the data available; we also need to secure it and consider who should see what.
In this chapter, we will learn the following topics:
Getting to know how to open the Security Editor and the difference between Universes/profiles and users/groups views
Creating a Data Security Profile using the IDT Security Editor
Creating a Business Security Profile using the IDT Security Editor
Assigning security profiles to users or groups
Creating a security matrix to map security profiles to associated users and groups