Answer Posted / karthik reddy
bi secuirty u have n no of tcodes to use some of the
important t codes are
RRMX Start the Business Explorer Analyzer
RSA1 Modeling - DW Workbench
RSD1 Characteristic maintenance
RSECADMIN Manage Analysis Authorizations
RSECAUTH Maintenance of Analysis Auth.
RSECPROT Maintenance of Analysis Auth.
RSRT Start of the report monitor
RSSM Authorizations for Reporting
RSU01 User Maintenance. BI Analysis Auth.
RSUDO Execution as Other User
RSCUSTV23 used to upgrade form bw 3.5 to bi 7.0
for any help regarding sap security mail to
karthikreddy7827@yahoo.com always here to help u
cheers if my ans helpd u
Is This Answer Correct ? | 9 Yes | 0 No |
Post New Answer View All Answers
Explain snc in sap security?
What is use of derived roles?
what is the main difference between the derived role and a single role?
What is sap internet transaction server?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
What are su22 t-codes used for?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What are su53 t-codes used for?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
what things you have to take care before executing run system trace?
what is the different b/w su10 and su12
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
What is the difference between the table buffer and the user buffer?