Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is purpose of using Pound Sign(#) and colon(;) in
BI/BW security

Answer Posted / chris obura

# sign is a plaeholder value sort of like a dummy value.
: sign is used for calculating aggregate values, if a query
needs to get totals this authorization will calculate the
aggregate value.

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

1251


What is the difference between c (check) and u (unmaintained)?

1951


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2203


What is use of derived roles?

1305


By which parameter number of entries are controlled in the user buffer?

1458


Authorization check on s_btch_job failed. What would happen now?

1261


What are some ap security t codes?

1223


how you can delete multiple roles from qa, dev and production system?

1345


How to assign any program to user?

1701


What does the profile generator do?

1179


Explain snc in sap security?

1248


How do you check background jobs?

1237


What are su25 t-codes used for?

1291


What is the difference between authorization object and authorization object class?

1181


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2211