Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What r the daily activity in BI security

Answer Posted / praveen

Creating Analysis Authorization - RSECADMIN and RSECAUTH
Assigning AAs to user - Direct and Indirect assignment
using RSU01
Trouble shooting BI security Issues using RSECPROT and
RSUDO T codes.
Using below BI Security tables
RSECVAL
RSDCUBE
RSDCUBEIOBJ
RSDCHA

Is This Answer Correct ?    6 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is audit information system?

1133


what is the difference between usobt_c and usobx_c?

1355


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2445


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1185


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2450


Explain secure store and forward?

1190


how you can delete multiple roles from qa, dev and production system?

1301


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2157


What happens to change documents when they are transported to the production system?

1831


Can you explain sap system transactions?

1138


Which t-code can be used to delete old security audit logs?

1486


Can you explain internet-level security?

1134


You want to create and maintain user master record. What authorization would you need?

1184


What does the pfcg_time_dependency clean up?

1261


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2133