Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer Posted / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is sap cryptographic library?
What is stad?
What is sap’s grc?
What appears as the last sentence in sap note 587410?
What is audit information system?
What are st01 t-codes used for?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
what is user base in sap security?
Explain transport system-level security?
How to assign any program to user?
what is the difference between usobt_c and usobx_c?
Support types of WOs you have faced?
Authorization check on s_btch_job failed. What would happen now?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
how a t code works