Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer Posted / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are the most used tables in sap?
What does user compare do?
What is t code?
What are se09 t-codes used for?
Can you explain internet-level security?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
How to run the daily background job s for virsa violations ? thabks in advance
How to insert missing authorization?
What are the uses of an authorization group?
what are all the questions covered in "profiles related concepts " please let me know ?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
How to update risk id in rule set?
Any details about secatt apart from SAPSecurity online.com?
You want to remove a developer's and developer keys from a system. How would you do that?