Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help

Answer Posted / bhuvana rani

Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to assign any program to user?

1615


How do you check background jobs?

1189


What is the use of Personalization tab in SU01?

5691


How we schedule and administering background jobs?

1133


What is the use of tmssup* rfc destinations?

2612


What is the use of su56?

1147


Is it possible to change role template? How?

1230


What is stad?

1172


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4208


What are su53 t-codes used for?

1371


what are the issues you faced with UME?

3065


Why is it important to delete sap-new profile? What steps will you take to do this?

1135


what is the critical issue u are faced in your previous experience

1940


What are st01 t-codes used for?

1155


What is audit information system?

1133