What are the T-codes in BI security
Answers were Sorted based on User's Feedback
Answer / karthik reddy
bi secuirty u have n no of tcodes to use some of the
important t codes are
RRMX Start the Business Explorer Analyzer
RSA1 Modeling - DW Workbench
RSD1 Characteristic maintenance
RSECADMIN Manage Analysis Authorizations
RSECAUTH Maintenance of Analysis Auth.
RSECPROT Maintenance of Analysis Auth.
RSRT Start of the report monitor
RSSM Authorizations for Reporting
RSU01 User Maintenance. BI Analysis Auth.
RSUDO Execution as Other User
RSCUSTV23 used to upgrade form bw 3.5 to bi 7.0
for any help regarding sap security mail to
karthikreddy7827@yahoo.com always here to help u
cheers if my ans helpd u
Is This Answer Correct ? | 9 Yes | 0 No |
RSU01
RSD1
RSA1
SE16
RSECADMIN
RSECAUTH
RSCUSTV23
Is This Answer Correct ? | 8 Yes | 0 No |
Answer / rachana
urgent openings for sap bi r/3 security and grc in
hyderabad,banglore,kolkatha for major companies like
ibm,hcl,csc,accenture plz post ur resume to
rachana.mindspace@gmail.com
exp:2-4 years
salary:as per comapny norms
vaccancy:30 posts
thanks and regards
senior hr
Is This Answer Correct ? | 0 Yes | 9 No |
SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
can we restrict access through tcode added manually in authorisation data in creating a role?
How to create secatt script in sap step by step
Is SU25 step(2nd) is mandatory when SAP up-gradation happened?
What are the 5 things you'll do if you have sap system to maintain (Sap securiy)
1 Answers Accenture, Ernst Young,
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
0 Answers Accenture, HCL, IBM,
what is the alternate tcode for su01?
how to modify a mass users validity,address,email...at a time ?
what is the difference between user buffer and user contex?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What is stad?