How see hierarchies in BI security
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What transactions can be assigned for all the users ?
Users are lockdown from past 3 -4 months. Which table is used to know that which users are lockdown?
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?
Whr will u find u Generation logs in BI security and What are Generation logs will come
What is the t-code used for locking the transaction from execution?
a user is assigned with tcode SA38.how to restrict him to execute only a few reports,say rsusr003.
what is diff b/w su01 and su10?
how do you add sap_all and sap_new in a role?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How I can reset the DDIC user's password? I have changed it from the delivered default?