Answer Posted / karthik reddy
bi secuirty u have n no of tcodes to use some of the
important t codes are
RRMX Start the Business Explorer Analyzer
RSA1 Modeling - DW Workbench
RSD1 Characteristic maintenance
RSECADMIN Manage Analysis Authorizations
RSECAUTH Maintenance of Analysis Auth.
RSECPROT Maintenance of Analysis Auth.
RSRT Start of the report monitor
RSSM Authorizations for Reporting
RSU01 User Maintenance. BI Analysis Auth.
RSUDO Execution as Other User
RSCUSTV23 used to upgrade form bw 3.5 to bi 7.0
for any help regarding sap security mail to
karthikreddy7827@yahoo.com always here to help u
cheers if my ans helpd u
Is This Answer Correct ? | 9 Yes | 0 No |
Post New Answer View All Answers
how we can see FFID if firefighter not able to see FFids ?
What are su56 t-codes used for?
what is the process to find that one consultant had removed a table from sap tables
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what is use of copy data in derived role and when we use this one ???
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
what is hypercare and go live support?
How to do Role Design, Testing and Implementation
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
Can you explain document transfer-level security?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
How we Provided Security design, configuration, and support for SAP Enterprise Portals
What is the difference between authorization object and authorization object class?
What are the most used tables in sap?