What is difference between BW and BI Security?
Answer Posted / sridhar.sapsecurity
BW Security - Restricting Access using Auth Objects
BI Secuirty - Restricting INFO OBJECT access using Analysis
Authorization.
| Is This Answer Correct ? | 12 Yes | 0 No |
Post New Answer View All Answers
when performing client copies what steps you need to take from CUA point of view?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
List the various user types.
What is the use of tmssup* rfc destinations?
how a t code works
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
what is the difference between usobt_c and usobx_c?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
What are se10 t-codes used for?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
How can I do a mass delete of the roles without deleting the new roles?
what is the different b/w su10 and su12
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
When would you update a sap table directly?