Answer Posted / karthik reddy
bi secuirty u have n no of tcodes to use some of the
important t codes are
RRMX Start the Business Explorer Analyzer
RSA1 Modeling - DW Workbench
RSD1 Characteristic maintenance
RSECADMIN Manage Analysis Authorizations
RSECAUTH Maintenance of Analysis Auth.
RSECPROT Maintenance of Analysis Auth.
RSRT Start of the report monitor
RSSM Authorizations for Reporting
RSU01 User Maintenance. BI Analysis Auth.
RSUDO Execution as Other User
RSCUSTV23 used to upgrade form bw 3.5 to bi 7.0
for any help regarding sap security mail to
karthikreddy7827@yahoo.com always here to help u
cheers if my ans helpd u
| Is This Answer Correct ? | 9 Yes | 0 No |
Post New Answer View All Answers
Explain protecting public keys?
when performing client copies what steps you need to take from CUA point of view?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
How can sap security be improved?
what are all the questions covered in "profiles related concepts " please let me know ?
What authorization are required to create and maintain user master records?
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
what is the different b/w su10 and su12
Differentiate between temp role and copy role
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Differentiate between saml token profile and a sap logon ticket
Explain document transfer-level security?
What are su22 t-codes used for?
What are su53 t-codes used for?