Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help

Answer Posted / bhuvana rani

Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the uses of an authorization group?

713


Can you explain protecting public keys?

594


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

626


how we Set up Central User Administration (CUA) to manage 4 systems/clients

1816


What is Sap security t-codes?

716






how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1697


How to assign any program to user?

1057


Can you explain snc in sap security?

642


how a t code works

1968


Can you explain secure store and forward?

617


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

2736


How to codify for an Item in SAP? How many digits are required for an item?

2185


what is user base in sap security?

1140


By which parameter number of entries are controlled in the user buffer?

906


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

1873