What is difference between BW and BI Security?
Answer Posted / sridhar.sapsecurity
BW Security - Restricting Access using Auth Objects
BI Secuirty - Restricting INFO OBJECT access using Analysis
Authorization.
| Is This Answer Correct ? | 12 Yes | 0 No |
Post New Answer View All Answers
Explain snc in sap security?
What is Sap security t-codes?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
what is the critical issue u are faced in your previous experience
Is it possible to change role template? How?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
When would you update a sap table directly?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Differentiate between usobx_c and usobt_c
How to run the daily background job s for virsa violations ? thabks in advance
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
How to create users?
What are su53 t-codes used for?