Symptom
Developers are using Trusted Authentication to go around Administrative security, creating applications where authorization should be granted only to admins.
How do we prevent Trusted Authentication from being used in this manner?
Read more...
Product
SAP BusinessObjects Enterprise XI 3.0
Keywords
trusted authentication protect secure prevent unauthorized access , KBA , BI , Business intelligence solutions , How To
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.