on 04-30-2007 5:47 PM
hi GURUS iam a fresher i hve some exp in r/3 security ......
iam doing bw security can any body pls pls pls mention wht t-codes r used in bw security ..............
thanks in advance
Sunny,
What version are you on?
The main transaction in newer versions is RSECADMIN and RSSM on older versions. However there is much more to it than just the starting tcodes.
There is a good amount of info on the net--try searching.
Cheers,
Ben
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi sunny,
check this link. It may help you.
https://www.sdn.sap.com/irj/sdn/wiki?path=/display/bi/authorizationinSAPNWBI
Reward points if helpful
Regards
Ganesh
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi Sunny,
Unlike R/3 Security, BW Security is not Transaction based, it actually deals with securing BW Objects like Info Objects, Info Cube, ODS, Info Source, etc....
The main Authorization Objects in BW are:
S_RS_ADMWB
S_RS_IOBJ
S_RS_ISOUR
S_RS_ISRCM
S_RS_ICUBE
S_RS_MPRO
S_RS_ODSO
S_RS_ISET
S_RS_HIER
S_RS_COMP
S_RS_COMP1
S_RS_FOLD
Suppress InfoAreaview of BExelementsRRMX
: Launches the BEx Analyzer, which is used to create andRSA1:
Launches the Administrator Workbench, which is used byRSSM
--Reporting Authorization Objects.Note:
The above information is for BW 3.x. Lot of things vary in BI.Hope it helps.
Please award points if it is useful.
Thanks & Regards,
Santosh
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
80 | |
9 | |
9 | |
7 | |
7 | |
6 | |
6 | |
6 | |
5 | |
4 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.