What r the daily activity in BI security
Answer Posted / praveen
Creating Analysis Authorization - RSECADMIN and RSECAUTH
Assigning AAs to user - Direct and Indirect assignment
using RSU01
Trouble shooting BI security Issues using RSECPROT and
RSUDO T codes.
Using below BI Security tables
RSECVAL
RSDCUBE
RSDCUBEIOBJ
RSDCHA
| Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
User is not there in User master record. Then how to trace the user?
How to update risk id in rule set?
What is the maximum number of profiles in a role and maximum number of object in a role?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
What are su53 t-codes used for?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Explain protecting public keys?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Explain snc in sap security?