What are the critical tables in BI Security
Answer / jordan
The critical tables in BW security are --
AGR_AGRS - SINGLE ROLES IN A COMP ROLE
AGR_USERS - USERS IN A PARTICULAR ROLE
AGR_1251 - AUTHORIZATION DATA IN A ROLE
AGR_1252 - ORG VALUES IN A ROLE
RSECVAL - VALUES OF ANALYSIS AUTHORIZATION
RSECHIE - HIERARCHY OF THE ANALYSIS AUTHORIZATION
Is This Answer Correct ? | 5 Yes | 3 No |
how segregation of duties in sap security?
The user have auth-obj in his profile but he's not able to execute, if he run su53 he's not getting the error and also we cannot able to execute st01 if I do user buffer also its not fetching any data what should I do?
2 Answers Aptron, eCare, Volvo,
How we Check if the PFCG_TIME_DEPENDENCY is running for user master reconciliations.
what is use of derived roles and where it is used?
how v Check SOD conflicts through VRAT
How to check to which web links user has access ? bcoz its not there any option in SUIM for this search and we add web links/reports while creating role. So how to check that ?
Through CTS how we come to know the Role?
what is centralized n decentralized
Could you please let me know the exact step by step process for the following Questions. 1.How to get the E-Mail address for 100 users at a time. 2.While Creating BW roles what are the Authorization Objects we will use. 3.While Creating Single role what will be happened in the functional side, when entered the Template role in the derived role tab. 4.when we changed the password for more users(for example:100 users) where the password will be stored or from where you can Re-Collect the password and how will you Communicate the password to all users at a time. 5.What is Virsa? Once you entered in to the screen what it will perform. 6.What is the use of SU24 & SM24. 7.While Creating BW roles what are the Authorization Objects we will use. 8.While Creating Single role what will be happened in the functional side, when you entered the Template role in the derived role tab. 9.What is Dialog users, Batch users and Communicate users. What is the use with Communicate user. 10.Can we add one Composite role in to another Composite role at any urgent user requests or in normal user requests. 11.In Transport what type of Request we will use.Why don't we use Workbench request in transport. 12.When we added Authorization Object in Template role, at the same time what will be happen in Derived role. 13.How to Check Profile parameter. And how to find whether any transport has ended with error and where we can check. 14.How to Extract users list like who didn't login since 3 months. And In 90 Days user Locking in which table we will use. 15.What is OSS Connection and System Opening and why we have to open these. 16.What will have in one single role and how many prifiles will be in one sap cua system. 17.What is the difference between Template role & Derive role.
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Explain internet-level security?
how we Work on VIRSA TOOL on Compliance calibrator, Fire Fighter