Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer Posted / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
Explain sap system transactions?
By which parameter number of entries are controlled in the user buffer?
what is user base in sap security?
When would you update a sap table directly?
Can you explain network topology in sap systems?
What is the main purpose of parameters, groups & personalization tabs?
how a t code works
How to find out who has deleted users in the system?
What are se10 t-codes used for?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what is the main difference between the derived role and a single role?
Which tables will you use for making customizing setting for security administration?
when performing client copies what steps you need to take from CUA point of view?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security