How can assign miising authorizations in BI?
Answer / karun
In BI Mainly Two types of Mising Authorizations.
1.Query access (S_RS_COMP) 2.Infoprovider(S-RS-AUTH)
1.New Query Access:
Goto his role -> click authorization tab -> find the auth
object S_RS_COMP ->provide the query in filed (RSZCOMPID)
2.Infoprovider:
Got His role -> click authorization tab -> find the
Auth object S-RS-AUTH -> copy the analysis auth object.
Goto RSECADMIN tcode -> enter Analysis object of the
user -> here provided the infoprovider
Missing auth:
1. You do not have authorization for Particular query.
2. You do not have authorization for infoprovider.
Is This Answer Correct ? | 5 Yes | 0 No |
what is the difference between BI AND BW security
What profile versions?
What are major changes happened in GRC 10 compared to that GRC 5.3?
Tell me about your SAP Career? (all interviews start with this queshion only...pls tell me a template for this answer)
one tcode,say sa38, is assigned to 10 diffrent users through a same role.I want to restrict one of those 10 users to execute only a few reports in sa38 but not all reports.what are the possible ways of getting it done?
1) Explain me about your SAP Career? 2) Tell me your daily monitoring jobs and most of them you worked on? 3) which version of SAP are you working on? Is it a java stack or abap stack? 4) Tell me about derived role? 5) what is the main difference between single role and a derived role 6) Does s_tabu_dis org level values in a master role gets reflected in the child role?? 7) Tell me the steps to configure CUA? 8) Is RAR a java stack or Abap Stack? 9) What is the report which states the critical T-codes? and also What is the T-code? 10) What is the T-code to get into RAR from R/3? 11) Explain about SPM?
how to resolve role conflict
Hi , Currently i am working in an MNC company as an SAP Security tier1 member , we will take care of User Administration , Profile/authorization administration activities .Could any one tell me , is i am eligible to apply for an SAP Security job for 2 years experience . Could any one tell me about SOD , SOX Audit and Virsa tool , i have never worked before . Prakash
Which of below authorization object that protect transaction code execution? A. S_TCODE B. P_TCODE C. Q_TCODE D. X_TCODE
6 Answers Cap Gemini, SAP Labs,
How to check to which web links user has access ? bcoz its not there any option in SUIM for this search and we add web links/reports while creating role. So how to check that ?
If I just want to give any user authorization to create role but not to copy from any role so how can I do this ?
Can we delete a Role and transport it?Explain How?