What are the T-codes in BI security

Answer Posted / karthik reddy

bi secuirty u have n no of tcodes to use some of the
important t codes are

RRMX Start the Business Explorer Analyzer

RSA1 Modeling - DW Workbench

RSD1 Characteristic maintenance

RSECADMIN Manage Analysis Authorizations

RSECAUTH Maintenance of Analysis Auth.

RSECPROT Maintenance of Analysis Auth.

RSRT Start of the report monitor

RSSM Authorizations for Reporting

RSU01 User Maintenance. BI Analysis Auth.

RSUDO Execution as Other User

RSCUSTV23 used to upgrade form bw 3.5 to bi 7.0


for any help regarding sap security mail to
karthikreddy7827@yahoo.com always here to help u

cheers if my ans helpd u

Is This Answer Correct ?    9 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain snc in sap security?

707


What is use of derived roles?

763


what is the main difference between the derived role and a single role?

691


What is sap internet transaction server?

706


how we Set up Central User Administration (CUA) to manage 4 systems/clients

1824






What are su22 t-codes used for?

693


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

838


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2366


What are su53 t-codes used for?

835


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

1646


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

1685


what things you have to take care before executing run system trace?

749


what is the different b/w su10 and su12

2184


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

643


What is the difference between the table buffer and the user buffer?

741