Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
Is This Answer Correct ? | 0 Yes | 0 No |
Is it possible to assign two roles with different validity period to a user in one shot through GRC? If yes, how
Q4) What are the limitations of ST01? Explain in detail?
two company codes ex 1001,1002 and two users ,one user need to access both company codes and another user need to access only one company code need to access by giving same role (one role ) to both of them.how can give access or restrict company codes in one role?
how to do Reporting and Analysis authorizations
What is the procedure for role modifications?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
how to delete a single role,the single role is existing with 10 users
hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?
1.What are the upgrades happened in GRC 5.3 from GRC 5.2?
Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?
Could any one tell me "What is critical authorizations in sap security"?
How we Educated client personnel in R/3 Security and general Basis knowledge