Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
Is This Answer Correct ? | 0 Yes | 0 No |
What's the use of Detour path? How Fork path differs from Detour path
Red, Yellow, Green in PFCG significance? Can we generate red Roles in PFCG and assign it to Users?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What are the Critical Tcodes and Authorization Objects in R/3.
Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help
what are the service market place activities from authorizations point of view ?
how do we test security systems.what is the use of SU56
what all are the numbers of user types in system measurement?
Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
How to trace the Users in BI Security and give me navigation
The user have auth-obj in his profile but he's not able to execute, if he run su53 he's not getting the error and also we cannot able to execute st01 if I do user buffer also its not fetching any data what should I do?
2 Answers Aptron, eCare, Volvo,
What is diffrence to add tcode in Menu tab(PFCG)and in S_TCODE object?