What r the daily activity in BI security
Answer Posted / praveen
Creating Analysis Authorization - RSECADMIN and RSECAUTH
Assigning AAs to user - Direct and Indirect assignment
using RSU01
Trouble shooting BI security Issues using RSECPROT and
RSUDO T codes.
Using below BI Security tables
RSECVAL
RSDCUBE
RSDCUBEIOBJ
RSDCHA
Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
what is sod in sap security?
How can I do a mass delete of the roles without deleting the new roles?
Can you explain snc in sap security?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Differentiate between saml token profile and a sap logon ticket
Can you explain secure store and forward?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Explain protecting public keys?
What are su56 t-codes used for?
How do we test security systems.
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
what is the use of defaults tab in start menu
what are all the questions covered in "profiles related concepts " please let me know ?
What is sap internet transaction server?