What r the daily activity in BI security
Answer Posted / praveen
Creating Analysis Authorization - RSECADMIN and RSECAUTH
Assigning AAs to user - Direct and Indirect assignment
using RSU01
Trouble shooting BI security Issues using RSECPROT and
RSUDO T codes.
Using below BI Security tables
RSECVAL
RSDCUBE
RSDCUBEIOBJ
RSDCHA
| Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Can you explain secure store and forward?
Differentiate between usobx_c and usobt_c
when performing client copies what steps you need to take from CUA point of view?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
What is the maximum number of profiles in a role and maximum number of object in a role?
Explain transport system-level security?
Explain x-glueb and its use in sap security.
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
Pfcg proposed activities but you need only two. What would you do?
User is not there in User master record. Then how to trace the user?
How to find out who has deleted users in the system?
explain the personalization tab within a role?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
what is user buffer?