Hello All,
Can any one tell me what are the sap tables will be used
while trouble shooting authorization issue BW security
activity
Answer Posted / vijay
There are few tables used in BI.
1.RSECVAL: To find the values maintained inside an analysis
authorizations.
2. RSECVALVIEW: values maintained for a user.
| Is This Answer Correct ? | 7 Yes | 0 No |
Post New Answer View All Answers
How to find ECC system, GRC system and BI system ?
Differentiate between derived role and composite role
How to create users?
How do we test security systems.
Explain transport system-level security?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Is it possible to change role template? How?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
Can you explain internet-level security?
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
Explain x-glueb and its use in sap security.
Explain secure store and forward?
Which transaction should not be given to BASIS and DEV team in Production?