What r the daily activity in BI security

Answer Posted / praveen

Creating Analysis Authorization - RSECADMIN and RSECAUTH
Assigning AAs to user - Direct and Indirect assignment
using RSU01
Trouble shooting BI security Issues using RSECPROT and
RSUDO T codes.
Using below BI Security tables
RSECVAL
RSDCUBE
RSDCUBEIOBJ
RSDCHA

Is This Answer Correct ?    6 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is sod in sap security?

732


How can I do a mass delete of the roles without deleting the new roles?

846


Can you explain snc in sap security?

642


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2011


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

983






Differentiate between saml token profile and a sap logon ticket

850


Can you explain secure store and forward?

617


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3234


Explain protecting public keys?

672


What are su56 t-codes used for?

686


How do we test security systems.

648


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

1629


what is the use of defaults tab in start menu

1388


what are all the questions covered in "profiles related concepts " please let me know ?

1630


What is sap internet transaction server?

697