Abstract:
© 2018, Institute of Advanced Scientific Research, Inc. All rights reserved. -In the modern world, data security is very important, it is very important to correctly distribute the Authorization between employees of the company and to provide only the most important information, to limit its confidential part from third parties, thereby preventing leakage, spoilage, falsification, etc. The security of SAP BW is an integral part of any BW implementation. Integration of all data coming from different source systems and providing access to data based on the user's role is one of the main problems of all BW projects [1]. The roles and authorities supported in BW7.4 provide a limit on access to reports at the level of info-cubes, key characteristics, hierarchies, etc., providing a wide range of tools for administering credentials and restricting users [2]. Nevertheless, the question of the intersection of Authorization limits the construction of user roles. Having full access to a certain characteristic in the report, the user can’t be limited by the same sign in the other. This restriction can’t be created with the of standard administrative tools, for this it is necessary to implement the method of implementing the multidimensional authorization concept in BW reports using analytical authorities, client programs in variables and etc. Strong security of the system is also of great economic importance. Fencing off their most important data from intruders, the probability of their loss is reduced. In cases of theft, the organization may incur large financial losses. Of course, the development of such a solution may require significant investment, but it fully covers the loss from possible accidents.