Accessing Content Objects
BOBJ is a reporting tool and an end user would typically use the BI launchpad to execute reports assigned to
Read MoreLearn SAP Security & Authorizations Concepts
BOBJ is a reporting tool and an end user would typically use the BI launchpad to execute reports assigned to
Read MoreEach of the applications in the BOBJ suite which are administered through the CMC exposes different rights on themselves to
Read MoreLike most other SAP applications, BOBJ uses a Role Based Access Control Mechanism. To assign roles or rights to a
Read MoreCentral Management Console or CMC is the central cockpit where the security consultant will spend most of his time. The
Read MoreA growing tendency of HR departments around the world has been to decentralize the maintenance of HR data. So instead
Read MoreAfter finishing the last post on SE16N and DEBUG, I realised that since this site primarily caters to the aspiring
Read MoreThis is a continuation of the many different articles on this blog around security around tables. However, the articles till
Read MoreFew aspects of SAP Security are as well explored by Security Consultants as security for Tables. SAP already provides a
Read MoreThe idea for this article came to me after reading through a question from a visitor to this site. I
Read MoreThe steps for creation of iview for a transaction are pretty self explanatory. I will copy the screens below. Hopefully
Read More