11.8 Summary
In this chapter, we covered the most important security concepts for an SAP BW/4HANA system. We provided an overview of the authentication methods supported by SAP BW/4HANA and then covered the authorization concept in SAP BW/4HANA in detail. We reviewed standard authorization objects, analysis authorizations, and roles. We covered how to perform user provisioning, role assignments, and administration before wrapping up with a brief discussion of troubleshooting authorization problems. In the next chapter, we’ll look ahead to the roadmap for SAP BW/4HANA.