Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How can assign miising authorizations in BI?

Answer Posted / karun

In BI Mainly Two types of Mising Authorizations.

1.Query access (S_RS_COMP) 2.Infoprovider(S-RS-AUTH)

1.New Query Access:

Goto his role -> click authorization tab -> find the auth
object S_RS_COMP ->provide the query in filed (RSZCOMPID)

2.Infoprovider:

Got His role -> click authorization tab -> find the
Auth object S-RS-AUTH -> copy the analysis auth object.

Goto RSECADMIN tcode -> enter Analysis object of the
user -> here provided the infoprovider

Missing auth:
1. You do not have authorization for Particular query.
2. You do not have authorization for infoprovider.

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1256


How to find ECC system, GRC system and BI system ?

1238


What authorization are required to create and maintain user master records?

1159


what is user base in sap security?

1727


What are su22 t-codes used for?

1147


Pfcg proposed activities but you need only two. What would you do?

1133


Is it possible to have more than one st of org-level values in one role? Explain your answer.

1106


What does user compare do?

1212


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1197


what is sod in sap security?

1240


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2165


What are pfud t-codes used for?

1265


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2263


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1065


What is a composite role?

1469