Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the T-codes in BI security

Answer Posted / karthik reddy

bi secuirty u have n no of tcodes to use some of the
important t codes are

RRMX Start the Business Explorer Analyzer

RSA1 Modeling - DW Workbench

RSD1 Characteristic maintenance

RSECADMIN Manage Analysis Authorizations

RSECAUTH Maintenance of Analysis Auth.

RSECPROT Maintenance of Analysis Auth.

RSRT Start of the report monitor

RSSM Authorizations for Reporting

RSU01 User Maintenance. BI Analysis Auth.

RSUDO Execution as Other User

RSCUSTV23 used to upgrade form bw 3.5 to bi 7.0


for any help regarding sap security mail to
karthikreddy7827@yahoo.com always here to help u

cheers if my ans helpd u

Is This Answer Correct ?    9 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is audit information system?

1089


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2526


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2285


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1137


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2241


How to codify for an Item in SAP? How many digits are required for an item?

2606


what is your ticketing tool? can we give some details about how we are getting tickets

1556


What does user compare do?

1158


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1921


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2392


How to update risk id in rule set?

1089


Can you explain internet-level security?

1076


Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.

2160


Can you explain network topology in sap systems?

1055


Explain protecting public keys?

1169