Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer Posted / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Explain snc in sap security?
How to codify for an Item in SAP? How many digits are required for an item?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Attributes in SE01?
What authorization are required to create and maintain user master records?
what is the main difference between the derived role and a single role?
what is user base in sap security?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the maximum number of profiles in a role and maximum number of object in a role?
How to insert missing authorization?
How to assign any program to user?
Any details about secatt apart from SAPSecurity online.com?
How can sap security be improved?