Answer Posted / karthik reddy
bi secuirty u have n no of tcodes to use some of the
important t codes are
RRMX Start the Business Explorer Analyzer
RSA1 Modeling - DW Workbench
RSD1 Characteristic maintenance
RSECADMIN Manage Analysis Authorizations
RSECAUTH Maintenance of Analysis Auth.
RSECPROT Maintenance of Analysis Auth.
RSRT Start of the report monitor
RSSM Authorizations for Reporting
RSU01 User Maintenance. BI Analysis Auth.
RSUDO Execution as Other User
RSCUSTV23 used to upgrade form bw 3.5 to bi 7.0
for any help regarding sap security mail to
karthikreddy7827@yahoo.com always here to help u
cheers if my ans helpd u
Is This Answer Correct ? | 9 Yes | 0 No |
Post New Answer View All Answers
By which parameter number of entries are controlled in the user buffer?
What does user compare do?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
how we do CUA configuration in Quality system
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
What is a composite role?
Differentiate between derived role and composite role
what is your ticketing tool? can we give some details about how we are getting tickets
What is Sap security t-codes?
How do you check background jobs?
How to find ECC system, GRC system and BI system ?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
Explain sap system transactions?
what is the critical issue u are faced in your previous experience
Which tables will you use for making customizing setting for security administration?