Hi Experts,
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
Answer Posted / bhuvana rani
Please see below links:
https://blogs.sap.com/2012/05/22/authorization-in-bi-7/
https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security/
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is use of copy data in derived role and when we use this one ???
Can you explain document transfer-level security?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
List the various user types.
What does user compare do?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
What are pfud t-codes used for?
Which transaction should not be given to BASIS and DEV team in Production?
How to find ECC system, GRC system and BI system ?
What is stad?
what is hypercare and go live support?
what is user buffer?