How to trace the Users in BI Security and give me
navigation
Answer Posted / ramamohan53200
Above answer is some what correct but before checking the
particular user authorization log / Error log that user
needs to be added in the users list.
Then only we can see that particular user authorization log
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain secure store and forward?
What is the difference between c (check) and u (unmaintained)?
explain the personalization tab within a role?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
How to find out who has deleted users in the system?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Pfcg proposed activities but you need only two. What would you do?
How to run the daily background job s for virsa violations ? thabks in advance
What are some ap security t codes?
List the various user types.
What is sap cryptographic library?
What is the use of su56?