What r the daily activity in BI security

Answer Posted / praveen

Creating Analysis Authorization - RSECADMIN and RSECAUTH
Assigning AAs to user - Direct and Indirect assignment
using RSU01
Trouble shooting BI security Issues using RSECPROT and
RSUDO T codes.
Using below BI Security tables
RSECVAL
RSDCUBE
RSDCUBEIOBJ
RSDCHA

Is This Answer Correct ?    6 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Differentiate between temp role and copy role

703


What are su53 t-codes used for?

835


Explain transport system-level security?

650


What are the most used tables in sap?

684


What does user compare do?

690






what is the critical issue u are faced in your previous experience

1431


How to find out who has deleted users in the system?

701


What is use of derived roles?

763


Support types of WOs you have faced?

1792


what things you have to take care before executing run system trace?

749


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1021


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

659


What is the difference between role and a profile?

740


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2013


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

635