What is difference between BW and BI Security?
Answer Posted / sridhar.sapsecurity
BW Security - Restricting Access using Auth Objects
BI Secuirty - Restricting INFO OBJECT access using Analysis
Authorization.
| Is This Answer Correct ? | 12 Yes | 0 No |
Post New Answer View All Answers
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
How can I do a mass delete of the roles without deleting the new roles?
What are st01 t-codes used for?
Which t-code can be used to delete old security audit logs?
When would you update a sap table directly? What precautions would you taje?
What does user compare do?
How do you check background jobs?
What is the use of su56?
Explain internet-level security?
what is user buffer?
Can you explain document transfer-level security?
What are se09 t-codes used for?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Differentiate between temp role and copy role
Can you explain protecting public keys?