How to trace the Users in BI Security and give me
navigation
Answer Posted / ramamohan53200
Above answer is some what correct but before checking the
particular user authorization log / Error log that user
needs to be added in the users list.
Then only we can see that particular user authorization log
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What are su56 t-codes used for?
When would you update a sap table directly? What precautions would you taje?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
Explain snc in sap security?
Can you explain document transfer-level security?
What are su25 t-codes used for?
what is the main difference between the derived role and a single role?
By which parameter number of entries are controlled in the user buffer?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What is the difference between authorization object and authorization object class?
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
Can you explain internet-level security?
What is the use of Personalization tab in SU01?
What is the difference between the table buffer and the user buffer?