Answer Posted / karthik reddy
bi secuirty u have n no of tcodes to use some of the
important t codes are
RRMX Start the Business Explorer Analyzer
RSA1 Modeling - DW Workbench
RSD1 Characteristic maintenance
RSECADMIN Manage Analysis Authorizations
RSECAUTH Maintenance of Analysis Auth.
RSECPROT Maintenance of Analysis Auth.
RSRT Start of the report monitor
RSSM Authorizations for Reporting
RSU01 User Maintenance. BI Analysis Auth.
RSUDO Execution as Other User
RSCUSTV23 used to upgrade form bw 3.5 to bi 7.0
for any help regarding sap security mail to
karthikreddy7827@yahoo.com always here to help u
cheers if my ans helpd u
| Is This Answer Correct ? | 9 Yes | 0 No |
Post New Answer View All Answers
How we Provided Security design, configuration, and support for SAP Enterprise Portals
What are the different types of sap security tables?
What is the use of Personalization tab in SU01?
How to run the daily background job s for virsa violations ? thabks in advance
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
Can you explain transport system-level security?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
How to insert missing authorization?
Any details about secatt apart from SAPSecurity online.com?
Can you explain protecting public keys?
User is not there in User master record. Then how to trace the user?
what is the different b/w su10 and su12
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
What is the main purpose of parameters, groups & personalization tabs?