Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is the difference between BI AND BW security

Answer Posted / srinivas reddy pulugam

In that they are asking diffrence between bw and bi now r3,


BW
in Bw we are using different transaction codes like rsd1
rsa1...ets, and its trasactional based not web based.its
having max 10 authorisation fields

BI
in BI we are using a tool like thats RSECADMIN, and its web
based not transactional based. in that we are using number
of authorisation fields, and new concept Analysis
authorisation is introdused in BI.....,

Is This Answer Correct ?    3 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is the process to find that one consultant had removed a table from sap tables

2537


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2329


List the various user types.

1065


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2287


Can you explain internet-level security?

1132


what is use of copy data in derived role and when we use this one ???

1806


What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

1372


Can you explain transport system-level security?

1243


What are the different types of sap security tables?

1109


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1057


What is the maximum number of profiles in a role and maximum number of object in a role?

1032


what is the critical issue u are faced in your previous experience

1939


By which parameter number of entries are controlled in the user buffer?

1400


What is the difference between authorization object and authorization object class?

1132


what are the issues you faced with UME?

3065