What r the daily activity in BI security
Answer Posted / praveen
Creating Analysis Authorization - RSECADMIN and RSECAUTH
Assigning AAs to user - Direct and Indirect assignment
using RSU01
Trouble shooting BI security Issues using RSECPROT and
RSUDO T codes.
Using below BI Security tables
RSECVAL
RSDCUBE
RSDCUBEIOBJ
RSDCHA
| Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
What is audit information system?
what is the difference between usobt_c and usobx_c?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
Explain secure store and forward?
how you can delete multiple roles from qa, dev and production system?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What happens to change documents when they are transported to the production system?
Can you explain sap system transactions?
Which t-code can be used to delete old security audit logs?
Can you explain internet-level security?
You want to create and maintain user master record. What authorization would you need?
What does the pfcg_time_dependency clean up?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.