How to trace the Users in BI Security and give me
navigation
Answer Posted / ramamohan53200
Above answer is some what correct but before checking the
particular user authorization log / Error log that user
needs to be added in the users list.
Then only we can see that particular user authorization log
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
When would you update a sap table directly? What precautions would you taje?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Can you explain protecting public keys?
How do you check background jobs?
Can you explain network topology in sap systems?
What is use of derived roles?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Which t-code can be used to delete old security audit logs?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Which transaction code is used to display the user buffer?
What are the different types of sap security tables?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
how we can see FFID if firefighter not able to see FFids ?