What are the T-codes in BI security

Answer Posted / siddhartha

RSU01
RSD1
RSA1
SE16
RSECADMIN
RSECAUTH
RSCUSTV23

Is This Answer Correct ?    8 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Set up Central User Administration (CUA) to manage 4 systems/clients

1994


What authorization is required to create and maintain user master records?

822


What are the most used tables in sap?

873


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

759


what is the main difference between the derived role and a single role?

841






Can you explain document transfer-level security?

845


How to insert missing authorization?

806


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3942


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2387


Explain transport system-level security?

824


Attributes in SE01?

2261


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

1178


What does the pfcg_time_dependency clean up?

958


what is user buffer?

900


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

1967