Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer Posted / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are the uses of an authorization group?
Can you explain protecting public keys?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
What is Sap security t-codes?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How to assign any program to user?
Can you explain snc in sap security?
how a t code works
Can you explain secure store and forward?
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
How to codify for an Item in SAP? How many digits are required for an item?
what is user base in sap security?
By which parameter number of entries are controlled in the user buffer?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects