Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is purpose of using Pound Sign(#) and colon(;) in
BI/BW security

Answer Posted / syed

Sign(#)is to Exclude the values in Analysis Authorization
and colon(;)stands for Segregated Values in Analysis
Authorization.

Is This Answer Correct ?    2 Yes 6 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2246


What is audit information system?

1129


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2234


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7171


What is the difference between role and a profile?

1293


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2341


What authorization is required to create and maintain user master records?

1103


How do you check background jobs?

1185


how to do Reporting and Analysis authorizations

2460


What is the difference between authorization object and authorization object class?

1128


what is the different b/w su10 and su12

2985


could anyone tell me how we can copy the mass roles from sap_all profiles???????

2145


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2131


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2327


What are se10 t-codes used for?

1133