General Settings are independent of the extraction type.
To Open General Settings #
In the main window of the Designer, double-click an extraction.
The main window of the component opens.
Within the opened window, click [General Settings].
The window “General Settings” opens.
Misc. Tab #
The miscellaneous tab consists of two subsections:
Cache results (1)
Note: The Cache results option is only available in pull destinations (e.g., PBI, Qlik etc.).
Pull destinations often pull the data from SAP for several times. To decrease the SAP server load, you can select the Cache results option, this way the pull destination pulls the data from cache and not from the SAP. This increases the performance and limits the impact on the SAP system. If this behavior is not desired (for example, because the data must be always 100% up to date), the cache option must be explicitly turned off.
Enable column level encryption (2)
This option needs to be active when using “Column Encryption”, see Encryption.
One or more keywords (Tags) can be set to an extraction. Keywords can be entered directly in the keyword field. Within the Designer you can use these keywords to filter extractions.
Tip: to display filter options, navigate to [Extractions] > [Filter] or press [CTRL]+[F].
Primary Key Tab #
Table extractions inherit the primary keys from SAP. Other objects such as SAP Query, BW Cube etc. require manual setting of the primary keys.
Depicted example demonstrates the SAP object KNA1 and KNVV with their primary key inherited from SAP in the general settings of the Designer. In this example the primary key consists of KUNNR, VKORG, VTWEG and SPART. The demonstrated primary key is also taken over in the destination.
Note: A defined primary key field in a table is a prerequisite for merging data.
The “Column Encryption” feature enables users to encrypt columns in the extracted data set before uploading them to the destination. By encrypting the columns you can ensure the safety of sensitive information. You can store data in its encrypted form or decrypt it right away.
The feature also supports random access, meaning that the data is decryptable at any starting point. Because random access has a significant overhead, it is not recommended to use column encryption for encrypting the whole data set.
Not all destinations support column encryption.
If the column encryption feature is available, you can select the columns to encrypt from a list of available columns.
Security Tab #
The security tab is described in the section access management.