Hello All,
Can any one tell me what are the sap tables will be used
while trouble shooting authorization issue BW security
activity
Answer / vijay
There are few tables used in BI.
1.RSECVAL: To find the values maintained inside an analysis
authorizations.
2. RSECVALVIEW: values maintained for a user.
Is This Answer Correct ? | 7 Yes | 0 No |
1 .what are the authorization switches in security
what all are the numbers of user types in system measurement?
whts the differents between SoX ,SoD??????wht kind of work Sox do as wel .....SoD do? whts is virsa??????? and VRAT,,,,VFAT,, how it workin security.
How can sap security be improved?
How to get the list of tcodes having by all users(EX-20 users)at a time?(through SUIM or TABLE) [we can get single user through SUIM->TRANSACTIONS- >EXECUTABLE USER....but same thing i want for multiple users at a time)
How many transactions codes can be assigned to a role?
What does the item category specify in a purchasing requisition in SAP Materials Management?
we have one parent role and we derived five roles from that and i assigned these derived roles to five users now i want to restrict 2 users for couple of T-codes and rest of the users work with those T-codes , How we can solve the problem
Whr will u find u Generation logs in BI security and What are Generation logs will come
What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?
What is the use of tmssup* rfc destinations?
What is Sap security t-codes?