Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
Is This Answer Correct ? | 0 Yes | 0 No |
SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.
What is the difference between c (check) and u (unmaintained)?
what is the use of start menu option in defaults tab in su01 screen
User tring to submit the request in GRC but user getting error, what could be the reason , while all BRF+ & MSMP working fine.?
What are su10 t-codes used for?
what is role designing
What is use of SNC tab in SU01 ? Please explain in detail.
how can u assign firefighter ids from one firefighter admin to another firefighter admin if current admin leaves from organization without told to any body?
Plz can anybody share ur work experience on Mitigating conflicts using SoDs with GRC tools or without GRC (thankful if examples r provided)
Pfcg proposed activities but you need only two. What would you do?
Q2) Can we ADD an organisational element in a role? If yes how??
Give some examples for Remediation and Mitigation in RAR?