Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How can assign miising authorizations in BI?

Answer Posted / karun

In BI Mainly Two types of Mising Authorizations.

1.Query access (S_RS_COMP) 2.Infoprovider(S-RS-AUTH)

1.New Query Access:

Goto his role -> click authorization tab -> find the auth
object S_RS_COMP ->provide the query in filed (RSZCOMPID)

2.Infoprovider:

Got His role -> click authorization tab -> find the
Auth object S-RS-AUTH -> copy the analysis auth object.

Goto RSECADMIN tcode -> enter Analysis object of the
user -> here provided the infoprovider

Missing auth:
1. You do not have authorization for Particular query.
2. You do not have authorization for infoprovider.

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Can you explain secure store and forward?

1040


Can you explain internet-level security?

1116


How to create users?

1198


what things you have to take care before executing run system trace?

1235


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2322


how we do CUA configuration in Quality system

2410


What authorization are required to create and maintain user master records?

1105


what is the critical issue u are faced in your previous experience

1920


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4189


What does the pfcg_time_dependency clean up?

1238


How to do Role Design, Testing and Implementation

2498


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4694


What is the use of su56?

1125


what is use of copy data in derived role and when we use this one ???

1777


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1124