Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
Is This Answer Correct ? | 0 Yes | 0 No |
What is use Of SHDB (Transaction Recorder) ?
How we schedule and administering background jobs?
What transactions can be assigned for all the users ?
i am asked to get through at "Authorizations analysis and correct assignments" wat does it mean and wat all concepts comes under these ?
What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?
How I can reset the DDIC user's password? I have changed it from the delivered default?
where v creat auth group
One of the user logged into Production System, changed a table and then logged out. How will you track him?
2 Answers Atos Origin, Infosys,
What are the Critical Tcodes and Authorization Objects in R/3.
Explain composite role?
What are se10 t-codes used for?
Can you explain composite role?