Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
Is This Answer Correct ? | 0 Yes | 0 No |
how we can see FFID if firefighter not able to see FFids ?
Explain network topology in sap systems?
What is Preventive and Detective controls in GRC AC 5.3?
How we do Scheduled jobs in background to cleanup spool request, dumps
User is not there in User master record. Then how to trace the user?
How can we Lock transaction ? What happens exactly ?
Can you explain protecting public keys?
How can we maintain Organizational values? How can we create Organizational values? What is the purpose of these Org. values?
How to know the total no. of users in particular plant in sap?
Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???
can we assign roles to user without user master comparison
what is routing rule , give one example?