Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is the difference between BI AND BW security

Answer Posted / mahesh

R3 is mainly used for the transactional data and auth
objects is used for the tocde restrictions
BI is used for the Reporting,BI authorization is for
Historical data access
where is R3 is real time data,
Analysis authorization is the new concept in BI
by which we can build the query restriction by value with
unlimited no of Infoobjects And trace aswell.

Is This Answer Correct ?    6 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the most used tables in sap?

1254


What authorization are required to create and maintain user master records?

1195


When would you update a sap table directly?

1124


what is the critical issue u are faced in your previous experience

1981


Tell me about derived role?

1121


Differentiate between derived role and composite role

1224


How to assign any program to user?

1693


What are su56 t-codes used for?

1309


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2498


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

1151


what are the issues you faced with UME?

3123


As a SAP security consultant what is the most challenged you faced in previous company?

1158


What are su53 t-codes used for?

1435


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2302


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3749