sap business objects security essentials (2010 asug sap business objects user conference)

40
] STEPHANIE CLUNE [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2004 PHIL AWTRY [ ASUG INSTALLATION MEMBER MEMBER SINCE: 1999 MIKE NARDUCCI [ ASUG ASSOCIATE MEMBER MEMBER SINCE: 1998 SAP Business Obj ects Securi ty Esse ntials Dallas Marks Session 409

Upload: osoccer

Post on 07-Apr-2018

230 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 1/40

]

STEPHANIE CLUNE[ASUG INSTALLATION MEMBER 

MEMBER SINCE: 2004

PHIL AWTRY[ASUG INSTALLATION MEMBER 

MEMBER SINCE: 1999

MIKE NARDUCCI[ASUG ASSOCIATE MEMBER 

MEMBER SINCE: 1998

SAP BusinessObjects Security EssentialsDallas MarksSession 409

Page 2: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 2/40

Real Experience. Real Advantage.

[ Breakout Description

In this presentation, learn how the SAP BusinessObjects securitymodel works. Leverage features, such as inheritance, scope of rights, and custom access levels, to secure the businessintelligence system, while reducing overall complexity andmaintenance. Techniques will be demonstrated using SAP

BusinessObjects XI that are also applicable to SAPBusinessObjects Edge BI. Real-world scenarios drive home theconcepts learned and give each attendee the confidence toimplement the same techniques back home.

2

Page 3: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 3/40

Real Experience. Real Advantage.

[ About Dallas Marks

Dallas Marks is a Senior Consultant and Trainer in the Information

Management/Business Intelligence practice of Quorum Business Solutions. Withoffices in Dallas, Houston, and Calgary, Alberta, Quorum helps clients of all sizesthroughout North America make better business decisions utilizing the power of business intelligence. Quorum is also an SAP BusinessObjects Authorized EducationProvider and provides education at its training centers in Dallas, Houston, and clientlocations across North America.

Dallas is an SAP BusinessObjects Certified Professional (BOCP) and authorizedtrainer for Web Intelligence, Universe Design, Xcelsius, and BusinessObjectsEnterprise administration. A seasoned consultant and speaker, Dallas has workedwith BusinessObjects tools since 2003 and presented at the North Americanconference each year since 2006.

Dallas has implemented SAP BusinessObjects solutions for a number of industries,including energy, health care, and manufacturing. He holds a master’s degree in

Computer Engineering from the University of Cincinnati.

Dallas blogs about various business intelligence topics athttp://www.dallasmarks.org/.

3

Page 4: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 4/40

Real Experience. Real Advantage.

[

4

Quorum Company Profile

SolutionsConsulting Firm

Founded in 1998

Houston, Dallas, Calgary

350+ employees

Employee owned; consistently profitable

Strategic growthIndustryExpertise

Oil & Gas

Other emerging markets

Upstream, Midstream, Marketing, Transportation

Business Intelligence

Clients 100+ clients

Multiple projects with many Clients

ProjectExperience

400+ successful projects

Page 5: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 5/40

Real Experience. Real Advantage.

[ Poll

By a show of hands, are you: Not currently running SAP BusinessObjects?

Using “classic” version 6.x and earlier?

Crystal Enterprise 10 and earlier?

SAP BusinessObjects Edge BI? SAP BusinessObjects Enterprise XI R2?

SAP BusinessObjects Enterprise XI 3.0?

SAP BusinessObjects Enterprise XI 3.1 SP2 or higher?

SAP BusinessObjects 4.0 (beta)?

Page 6: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 6/40

Real Experience. Real Advantage.

[ Agenda

Comparing XI R2 and XI 3.x Security SAP BusinessObjects Security Basics

Demonstration

Custom Access Levels, Permissions Explorer and Security Query

Best Practices Next Steps

Your Questions

Page 7: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 7/40Real Experience. Real Advantage.

[

COMPARING XI R2 ANDXI 3.X SECURITY

SAP BusinessObjects Security Essentials

Page 8: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 8/40Real Experience. Real Advantage.

[

Users XI R2 XI 3.x

Administrator yes yes

Guest yes yes

QaaWSServletPrincipal no yes

PMUser yes no

Set Administrator password during install? no yes

Guest user disabled by default? no yes

Groups XI R2 XI 3.x

Administrators yes yes

Everyone yes yes

QaaWS Group Designer no yes

Report Conversion Tool Users yes yes

BusinessObjects NT Users yes no

Universe Designer users yes yes

Translators no yes

Default Users and Groups

Page 9: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 9/40Real Experience. Real Advantage.

[

Feature XI R2 XI 3.xFolder Inheritance yes yes

Group Inheritance yes yes

Predefined Access Levels yes yes

No Access yes yes*

View yes yes

Schedule yes yes

View On Demand yes yes

Full Control yes yes

Advanced Rights yes yes

Custom Access Levels no yes

Break Inheritance yes yesScope of Rights no yes

Combined Access Levels no yes

Security Features

Page 10: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 10/40Real Experience. Real Advantage.

[

Application XI R2 XI 3.xCentral Management Console yes yes!

Web Component Adapter (WCA) yes no

Administrative Launchpad yes no

Query Builder yes yes

Security Viewer Add-on yes no

Security Query no yes

Permissions Explorer no yes

Security Applications

Page 11: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 11/40Real Experience. Real Advantage.

[

SECURITY BASICS

SAP BusinessObjects Security Essentials

Page 12: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 12/40Real Experience. Real Advantage.

[ Terminology

Principal – a user or group Rights override - a rights behavior in which

rights that are set on child objects overridethe rights set on parent objects

General Global Rights – access rightsenforced regardless of content type

Content Specific Rights – access rights uniqueto content type (Crystal Report, WebIntelligence, etc)

Page 13: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 13/40Real Experience. Real Advantage.

[ Predefined Rights

Rights Option Description XI R2 XI 3.x

No Access Unable to access an object yes

slightly

different

View Able to view historical (scheduled) instances of an object yes yes

Schedule Able to schedule instances of an object yes yes

View on Demand Able to view live data on-demand yes yes

Full Control Able to change or delete an object yes yes

Page 14: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 14/40Real Experience. Real Advantage.

[ Advanced/Granular Rights

Rights Option Description XI R2 XI 3.xGranted The right is granted to a principal. yes yes

Denied The right is denied to a principal. yes yes

Not Specified

The right is unspecified for a principal. By

default, rights set to Not Specified are denied. yes yes

Apply to Object

The right applies to the object. This optionbecomes available when you click Granted or

Denied. no yes

Apply to Sub-Objects

The right applies to sub-objects. This option

becomes available when you click Granted or

Denied. no yes

Page 15: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 15/40Real Experience. Real Advantage.

[ Folder Inheritance

Global Rights

Object

Object

Object

Object

Top Level Folder

Subfolder

Subfolder

NOTE:In XI R2, global rights are set on the Rights tabin the Settings management area.

In XI 3.x, global rights are set in the Foldersmanagement area as “All Folders Security”

Page 16: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 16/40Real Experience. Real Advantage.

[ Group Inheritance Rules

eFashion Sales Managers 2008

eFashion East eFashion South eFashion West

Barrett Richards Larry Leonard Bennett Steve

Page 17: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 17/40Real Experience. Real Advantage.

[ Breaking Inheritance

Still possible in XI 3.x as itwas in XI Release 2

Can disable folderinheritance, group

inheritance, or both May not be as necessary in

XI 3.x because of newscope of rights features

Page 18: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 18/40Real Experience. Real Advantage.

[ Custom Access Levels

New Management Area in CMC XI 3.x

Can create new access levels or copy existingaccess levels

Pre-defined rights (View, Schedule, View OnDemand, Full Control) levels cannot bealtered

Easier to manage than setting Advanced rights

Page 19: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 19/40Real Experience. Real Advantage.

[ Scope of Rights

Scope of rights – new in XI 3.x, the ability to limit the

extent of rights inheritance (Apply to Object, Apply toSub-object)

In BusinessObjects Enterprise XI R2, the administrator wasforced to break inheritance when they wanted to give user

rights to child folders that were different to those given to theparent folder

In XI 3.x, rights are effective for both the parent object and thechild objects by default (same as XI R2). However…

Page 20: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 20/40Real Experience. Real Advantage.

[ Scope of Rights, cont.

With BusinessObjects Enterprise XI 3.x, the administrator can now specify that

a right set on a parent object should apply to that object only.

Page 21: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 21/40Real Experience. Real Advantage.

[

DEMONSTRATION  – 

USERS, GROUPS, FOLDERS

SAP BusinessObjects Security Essentials

Page 22: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 22/40Real Experience. Real Advantage.

[ Demonstration – Users & Groups

Page 23: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 23/40Real Experience. Real Advantage.

[ Demonstration – Folders and Content

Page 24: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 24/40Real Experience. Real Advantage.

[

DEMONSTRATION – 

CUSTOM ACCESS LEVELS

SAP BusinessObjects Security Essentials

Page 25: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 25/40

Real Experience. Real Advantage.

[ Demonstration – Custom Access Levels

Custom Access Level demo…

Page 26: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 26/40

Real Experience. Real Advantage.

[

DEMONSTRATION-PERMISSIONS EXPLORER AND

SECURITY QUERY

SAP BusinessObjects Security Essentials

Page 27: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 27/40

Real Experience. Real Advantage.

[ Permissions Explorer (object centric)

Use the Permissions Explorer to determine the rightsa principal has on an object

Improvement upon Check User Rights button in XIRelease 2. Check User Rights only identified the

effective rights – the source of the rights assignmentwas still unknown

Available from any object (folder, document, universe,connection, etc.) that can have rights assigned

Page 28: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 28/40

Real Experience. Real Advantage.

[ Permissions Explorer

Permissions Explorer demo…

Page 29: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 29/40

Real Experience. Real Advantage.

[ Security Query (user centric)

Use Security Query to determine the objects to which aprincipal has been granted or denied access.

Available from Users and Groups or Query Results

Page 30: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 30/40

Real Experience. Real Advantage.

[ Security Query – Query Principal

Query Principal - the user or groupthat you want to run the security queryfor. You can specify one principal for eachsecurity query

Page 31: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 31/40

Real Experience. Real Advantage.

[ Security Query – Query Permission

Query Permission - the right or rightsyou want to run the security query for,the status of these rights, and the object

type these rights are set on

Page 32: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 32/40

Real Experience. Real Advantage.

[ Security Query – Query Context

Query Context - the CMC areas thatyou want the security query to search.For each area, you can choose whetherto include sub-objects in the securityquery. A security query can have amaximum of four areas

Security Query demo…

[

Page 33: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 33/40

Real Experience. Real Advantage.

[

BEST PRACTICES

SAP BusinessObjects Security Essentials

[

Page 34: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 34/40

Real Experience. Real Advantage.

[ Security Best Practices - XI R2 or XI 3.x

Grant rights to groups on folders. Although rights can begranted on individual objects or users, the security model canbecome difficult to maintain.

Use pre-defined rights wherever possible. Understand theadditional complexity that advanced rights can introduce.

Avoid breaking inheritance, while understanding it issometimes necessary

Add multiple users to Administrators group rather thansharing Administrator user account to improve traceability

Document and maintain your security structure outside of theCMC – MS Excel is a good choice

[

Page 35: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 35/40

Real Experience. Real Advantage.

[ Security Best Practices - XI 3.x

Allot time in your upgrade/migration for administrative staff tounderstand both the new CMC interface/workflows as well asits new features

Use custom access levels where you would have previouslyresorted to advanced rights.

Identify opportunities to limit the scope of rights instead of breaking inheritance

Take advantage of the Permissions Explorer and SecurityQuery tools to diagnose and correct security issues

[

Page 36: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 36/40

Real Experience. Real Advantage.

[

NEXT STEPS

Deploying BI to the Masses

36

[

Page 37: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 37/40

Real Experience. Real Advantage.

[ Relevant ASUG SBOUC 2010 Breakout Sessions

37

I can CAL, can you?

(Custom Access Levels)Sandra Brotje | Session 0405

Tuesday, October 5, 2010 | 4:00 PM – 5:00 PM

[

Page 38: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 38/40

Real Experience. Real Advantage.

[ Recommended Reading

SAP BusinessObjects Enterprise Administrator’s Guide

SAP BusinessObjects Enterprise XI 3.0/3.1 Upgrade Guide SAP BusinessObjects 5/6 to XI 3.1 Migration Guide

38

Visit the SAP Help Portal athttp://help.sap.com todownload these resources.

[

Page 39: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 39/40

Real Experience. Real Advantage.

[ Relevant Education

SAP BusinessObjects Enterprise XI 3.0/3.1:

Administration and Security2 days - course code BOE310

SAP BusinessObjects Enterprise XI 3.0/3.1:

Administering Servers3 days - course code BOE320

SAP BusinessObjects Enterprise XI 3.0/3.1:

Designing and Deploying a Solution

4 days - course code BOE330

39

Official SAP BusinessObjects curriculum is available on-site at your

location or at authorized education centers around the world.

[

Page 40: SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

8/6/2019 SAP Business Objects Security Essentials (2010 ASUG SAP Business Objects User Conference)

http://slidepdf.com/reader/full/sap-business-objects-security-essentials-2010-asug-sap-business-objects-user 40/40

[

[

] Thank you for participating.

SESSION CODE:

409

Please remember to complete and return your

evaluation form following this session.

For ongoing education on this area of focus, visit the Year-Round

Community page at www.asug.com/yrc

Dallas MarksSenior Consultant & Trainer

Quorum Business [email protected]

http://www.dallasmarks.org/blog/

For more information about Quorum Business Solutions:http://www.qbsol.com/

[email protected]