Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help

Answer Posted / bhuvana rani

Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the most used tables in sap?

1182


What does user compare do?

1174


What is t code?

1082


What are se09 t-codes used for?

1232


Can you explain internet-level security?

1096


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2262


How to run the daily background job s for virsa violations ? thabks in advance

3628


How to insert missing authorization?

1097


What are the uses of an authorization group?

1152


what are all the questions covered in "profiles related concepts " please let me know ?

2081


What does the account assessment category specify in a purchasing order in SAP Materials Management?

1416


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1941


How to update risk id in rule set?

1102


Any details about secatt apart from SAPSecurity online.com?

2279


You want to remove a developer's and developer keys from a system. How would you do that?

1059