What r the daily activity in BI security
Answer Posted / praveen
Creating Analysis Authorization - RSECADMIN and RSECAUTH
Assigning AAs to user - Direct and Indirect assignment
using RSU01
Trouble shooting BI security Issues using RSECPROT and
RSUDO T codes.
Using below BI Security tables
RSECVAL
RSDCUBE
RSDCUBEIOBJ
RSDCHA
Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
how a t code works
Is it possible to have more than one st of org-level values in one role? Explain your answer.
What appears as the last sentence in sap note 587410?
What is stad?
What is Sap security t-codes?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
What does the profile generator do?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Explain network topology in sap systems?
Which transaction code is used to display the user buffer?
When would you update a sap table directly?
What is the main purpose of parameters, groups & personalization tabs?
What is the use of tmssup* rfc destinations?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.