Whr will u find u Generation logs in BI security and
What are Generation logs will come
Answer Posted / srikanth g
Go to t-code RSECADMIN-->Analysis tab-->click on Generation
logs.
Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Which tables will you use for making customizing setting for security administration?
what is sod in sap security?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What are se09 t-codes used for?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
what are the issues you faced with UME?
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the difference between c (check) and u (unmaintained)?
Can you explain transport system-level security?