Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
Is This Answer Correct ? | 0 Yes | 0 No |
Can you explain internet-level security?
does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile
What is the t-code used for locking the transaction from execution?
what is meant by "Password is not downward compatible"?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
what is the critical issue u are faced in your previous experience
how do we get list of users who are having mail-id’s in SU01 (Address tab)
How I can reset the DDIC user's password? I have changed it from the delivered default?
What is stad?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
What are the most used tables in sap?
How to assign single tcode to 100 roles with single take