What are the T-codes in BI security

Answer Posted / karthik reddy

bi secuirty u have n no of tcodes to use some of the
important t codes are

RRMX Start the Business Explorer Analyzer

RSA1 Modeling - DW Workbench

RSD1 Characteristic maintenance

RSECADMIN Manage Analysis Authorizations

RSECAUTH Maintenance of Analysis Auth.

RSECPROT Maintenance of Analysis Auth.

RSRT Start of the report monitor

RSSM Authorizations for Reporting

RSU01 User Maintenance. BI Analysis Auth.

RSUDO Execution as Other User

RSCUSTV23 used to upgrade form bw 3.5 to bi 7.0


for any help regarding sap security mail to
karthikreddy7827@yahoo.com always here to help u

cheers if my ans helpd u

Is This Answer Correct ?    9 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we can see FFID if firefighter not able to see FFids ?

1664


What are su56 t-codes used for?

884


what is the process to find that one consultant had removed a table from sap tables

2186


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1859


what is use of copy data in derived role and when we use this one ???

1476






In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

791


what is hypercare and go live support?

4990


How to do Role Design, Testing and Implementation

2201


You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

893


Can you explain document transfer-level security?

845


What does the account assessment category specify in a purchasing order in SAP Materials Management?

1156


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2525


How we Provided Security design, configuration, and support for SAP Enterprise Portals

1917


What is the difference between authorization object and authorization object class?

838


What are the most used tables in sap?

873