What r the daily activity in BI security
Answer Posted / praveen
Creating Analysis Authorization - RSECADMIN and RSECAUTH
Assigning AAs to user - Direct and Indirect assignment
using RSU01
Trouble shooting BI security Issues using RSECPROT and
RSUDO T codes.
Using below BI Security tables
RSECVAL
RSDCUBE
RSDCUBEIOBJ
RSDCHA
Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
Differentiate between temp role and copy role
What are su53 t-codes used for?
Explain transport system-level security?
What are the most used tables in sap?
What does user compare do?
what is the critical issue u are faced in your previous experience
How to find out who has deleted users in the system?
What is use of derived roles?
Support types of WOs you have faced?
what things you have to take care before executing run system trace?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
What is the difference between role and a profile?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?