Start of Content Area

Background documentation User Management  Locate the document in its SAP Library structure

BI uses the user management function that is delivered for the ABAP and Java SAP NetWeaver Application Platforms.

See also:

User Management

Users

Standard users created when the BI system is installed

See Protecting Standard Users

Caution

Change initial passwords after installation to ensure that standard users cannot be misused.

Standard users specified when the SAP J2EE Engine is installed

See SAP NetWeaver Application Server Java Security Guide ® User Administration and Authentication ® User Administration and Standard Users  ®  Standard Users and  ® Standard User Groups.

Caution

Change initial passwords after installation to ensure that standard users cannot be misused.

Users in BI and SAP Source System

The following table provides an overview of additional users required when using the BI and BI Java usage types: These users are not delivered and do not have default passwords.

System

Users

Type

Description

BI

Database user

 

For more information on database users, see Operating System and Database Platform Security Guides

BI

Background user in BI (BWREMOTE)

Technical user

The background user in BI is used for communication with the BI source systems, for the extraction of data, and for background processes in BI. You create the background user in BI in the Implementation Guide and assign it a password (SAP NetWeaver  ® Business Intelligence  ® Automated Processes  ® Create User for Background Processes).  SAP recommends that you call the BI background user BWREMOTE. The system asks for a background user password when connecting to the source system. The authorization profile for the background user is S_BI-WHM_RFC.

See also:

Authorization Profile for Background Users.

SAP source system

Background user in SAP source system (ALEREMOTE)

Technical user

The background user in the SAP source system is used for communication with BI and for the extraction of data.

If you connect an SAP source system to BI, the background user is to be created in the source system. You can create the user directly in the source system in user maintenance. You can enter a name in the Implementation Guide in BI that will be used as the default name for the background user when you connect a new source system. (See SAP NetWeaver  ® Business Intelligence  ® Links to Other Systems  ® Connections Between SAP Systems and BI System ® Maintain proposal for users in the source system (ALE communication). SAP recommends that you call the BW background user for the source system ALEREMOTE. If the source system you are using is also a BI system, SAP recommends that you create the background user for BI and the background user for the (BI) source system completely separately. The authorization profile for the background user in the source system is S_BI-WX_RFC.

See also:

Authorization Profile for Background Users.

BI

Administrator

Individual user

The BI administrator is responsible for the connection to source systems, loading of metadata and implementation of BI statistics, among other things. This user develops the data model and plans and monitors the processes in BI (such as the loading process).

See also:

Authorization Profile for Working with the AWB

BI

Authors and analysts

Individual user

Authors and analysts require advanced analysis functionality and the ability to examine ad-hoc data. In order to accomplish their tasks, they required useful, manageable reporting an analysis tools.

See also:

Authorizations for Query Definition and Information Broadcasting

BI

Executives and Knowledge Workers

Individual user

Executives and Knowledge Workers require personalized, context-related information that is accessible via an intuitive user interface. They generally work with pre-defined navigation paths, but require the option of analyzing the summary data more deeply.

See also:

Analysis Authorizations

BI

Information Consumers

Individual user

Information Consumers require specific information (snapshot of a specific data set) in order to be able to execute their operative tasks.

See also:

Analysis Authorizations

 

 

End of Content Area