what is the difference between BI AND BW security

Answer Posted / mahesh

R3 is mainly used for the transactional data and auth
objects is used for the tocde restrictions
BI is used for the Reporting,BI authorization is for
Historical data access
where is R3 is real time data,
Analysis authorization is the new concept in BI
by which we can build the query restriction by value with
unlimited no of Infoobjects And trace aswell.

Is This Answer Correct ?    6 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

707


You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

734


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

1679


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1791


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

701






what is hypercare and go live support?

4733


What is use of derived roles?

763


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

636


Explain internet-level security?

643


What are pfud t-codes used for?

697


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

547


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2019


What are st01 t-codes used for?

730


What are the different types of sap security tables?

664


What is the difference between authorization object and authorization object class?

650