Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer Posted / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
How to assign any program to user?
How do you check background jobs?
What is the use of Personalization tab in SU01?
How we schedule and administering background jobs?
What is the use of tmssup* rfc destinations?
What is the use of su56?
Is it possible to change role template? How?
What is stad?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
What are su53 t-codes used for?
what are the issues you faced with UME?
Why is it important to delete sap-new profile? What steps will you take to do this?
what is the critical issue u are faced in your previous experience
What are st01 t-codes used for?
What is audit information system?