How see hierarchies in BI security

Answer Posted / arunesh

table RSECHIE

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3241


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

836


Can you explain internet-level security?

651


What is Sap security t-codes?

720


Explain internet-level security?

642






Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

1618


Explain protecting public keys?

677


What are su22 t-codes used for?

693


what is use of copy data in derived role and when we use this one ???

1332


Can you explain document transfer-level security?

668


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1791


What is audit information system?

717


How to codify for an Item in SAP? How many digits are required for an item?

2190


What is the difference between the table buffer and the user buffer?

736


What are the most used tables in sap?

675