what is the difference between BI AND BW security
Answers were Sorted based on User's Feedback
Answer / mahesh
R3 is mainly used for the transactional data and auth
objects is used for the tocde restrictions
BI is used for the Reporting,BI authorization is for
Historical data access
where is R3 is real time data,
Analysis authorization is the new concept in BI
by which we can build the query restriction by value with
unlimited no of Infoobjects And trace aswell.
Is This Answer Correct ? | 6 Yes | 2 No |
Answer / srinivas reddy pulugam
In that they are asking diffrence between bw and bi now r3,
BW
in Bw we are using different transaction codes like rsd1
rsa1...ets, and its trasactional based not web based.its
having max 10 authorisation fields
BI
in BI we are using a tool like thats RSECADMIN, and its web
based not transactional based. in that we are using number
of authorisation fields, and new concept Analysis
authorisation is introdused in BI.....,
Is This Answer Correct ? | 3 Yes | 2 No |
1.WHAT IS DIFFERENCE B/W OWNER,CONTROLER AND ADMINISTRATOR IN FF? 2.WHAT IS THE DIFFERENCE B/W THESE PERSONS ROLES? 3.WHAT IS THE ONLINE AND OFFLINE RISKS?
How we schedule and administering background jobs?
What is the main purpose of Parameters, Groups & Personalization tabs in SU01 and Miniapps in PFCG? thanks in advance
How can you lock all the users at a time?
what is user base in sap security?
for eaxmple we are creating Z-Tcode How to restrict and what level are restict.
How to restrict Table access in SAP?
Mwhat is the maximum number of profiles in a role and maximum number of object in a role?
In an environment of derived roles ; a user is asking for a t-code ; which is not found in suim in search of roles ? what will u do ?
Tell me about your SAP Career? (all interviews start with this queshion only...pls tell me a template for this answer)
1. what is the difference b/w change authorization mode and expert mode. 2.when we do the user comparison in pfcg what is the difference in complete comparison and expert mode comparison. 3. what are the critical auth objects in security point of you , 4.when we do the transportation of composite role what will happened . 5.while doing the kernel upgrade we download the executable s one by one are all together. 6. while applying the patches what is the importance of test import why we do test import
SU25 Step6 How Roles are created through Profiles?