What are the T-codes in BI security

Answer Posted / siddhartha

RSU01
RSD1
RSA1
SE16
RSECADMIN
RSECAUTH
RSCUSTV23

Is This Answer Correct ?    8 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between c (check) and u (unmaintained)?

1304


Can you explain sap system transactions?

764


Can wildcards be used in authorizations?

812


What is stad?

816


When would you update a sap table directly? What precautions would you taje?

850






Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3340


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

828


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

748


What is the main purpose of parameters, groups & personalization tabs?

744


Can you explain secure store and forward?

699


What is sap’s grc?

827


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1017


What is the use of tmssup* rfc destinations?

1947


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1139


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1959