SAP Knowledge Base Article - Preview

1262297 - XIR2 - How to Setup and Configure Trusted Authentication


This note is a pointer to published documentation to guide the user in setting up and configuring Trusted Authentication for BusinessObjects Enterprise XI Release 2.

See Below:

  • BusinessObjects Enterprise XI Release 2 Deployment and Configuration Guide

    • This product guide contains detailed information about Trusted Authentication setup and configuration options

  •  Configuring Trusted Authentication in BusinessObjects XI Release 2 Using the IIS to Tomcat Bridge

    • This article discusses a specific configuration scenario using IIS and Tomcat to perform Trusted Authentication (using REMOTE_USER)



SAP BusinessObjects Business Intelligence platform R2


SSO single sign on sign-on silent automatic logon trusted authentication auth TA , KBA , BI , Business intelligence solutions , How To

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.