Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
Is This Answer Correct ? | 0 Yes | 0 No |
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
How to Maintenance of User Master Records, Profiles, Authorizations
Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?
what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How to do Role Design, Testing and Implementation
how to lock the client?
how to delete a single role,the single role is existing with 10 users
After maintaining authorization fields, we save and generate the profile. But it prompts for the profile name right when we click on 'Save' icon. So what is the basic difference between Saving and Profile Generating?
what reports or programs can be used to regenerate sap_all profile?
Can you explain internet-level security?
We have one request to modify role(adding field value in auth. object) and we have added it. when transporting that role, getting error "role XXXXX type is undetermined" can any body please suggest, how to fix this issue?