How to trace the Users in BI Security and give me
navigation
Answer Posted / ramamohan53200
Above answer is some what correct but before checking the
particular user authorization log / Error log that user
needs to be added in the users list.
Then only we can see that particular user authorization log
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Can wildcards be used in authorizations?
Authorization check on s_btch_job failed. What would happen now?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
How can sap security be improved?
How to codify for an Item in SAP? How many digits are required for an item?
how to do Reporting and Analysis authorizations
what things you have to take care before executing run system trace?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Can you explain secure store and forward?
What is sap internet transaction server?
What is sap’s grc?
what is sod in sap security?
What are pfud t-codes used for?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Attributes in SE01?