How to trace the Users in BI Security and give me
navigation
Answer Posted / ramamohan53200
Above answer is some what correct but before checking the
particular user authorization log / Error log that user
needs to be added in the users list.
Then only we can see that particular user authorization log
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
what is use of copy data in derived role and when we use this one ???
What are the most used tables in sap?
As a SAP security consultant what is the most challenged you faced in previous company?
What is t code?
By which parameter number of entries are controlled in the user buffer?
what are the issues you faced with UME?
what is the critical issue u are faced in your previous experience
What is the maximum number of profiles in a role and maximum number of object in a role?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
when performing client copies what steps you need to take from CUA point of view?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
How do we test security systems.
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
What authorization are required to create and maintain user master records?
What does the item category specify in a purchasing order in SAP Materials Management?