Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help

Answer Posted / bhuvana rani

Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is sap cryptographic library?

633


What is stad?

735


What is sap’s grc?

723


What appears as the last sentence in sap note 587410?

658


What is audit information system?

717






What are st01 t-codes used for?

728


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4126


what is user base in sap security?

1142


Explain transport system-level security?

644


How to assign any program to user?

1057


what is the difference between usobt_c and usobx_c?

771


Support types of WOs you have faced?

1787


Authorization check on s_btch_job failed. What would happen now?

780


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3048


how a t code works

1974