Summary

In this chapter, you learned how to secure our dashboard as an object by applying the proper access levels to the corresponding users. You also learned how to control and assign dashboard application privileges. After that, you learned how to secure our data by applying row level security. Finally, we discussed the best practices that we need to consider while designing our security model for our dashboards.

In the next chapter, you will learn how to create mobile dashboards and how to identify mobile supported components. Also, you will learn some tricks and tips on how to overcome unsupported mobile components.

Get Learning SAP BusinessObjects Dashboards now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.