SAP Authentication in CMC
Till now we have created users and group in the CMC and mapped these groups to application and content rights.
Read MoreLearn SAP Security & Authorizations Concepts
Posts on BW and BOBJ. These posts are applicable for both HANA and non-HANA databases.
Till now we have created users and group in the CMC and mapped these groups to application and content rights.
Read MoreJust like rights for content, Business Objects also allows us to set the rights that users have for specific application
Read MoreBOBJ is a reporting tool and an end user would typically use the BI launchpad to execute reports assigned to
Read MoreEach of the applications in the BOBJ suite which are administered through the CMC exposes different rights on themselves to
Read MoreLike most other SAP applications, BOBJ uses a Role Based Access Control Mechanism. To assign roles or rights to a
Read MoreCentral Management Console or CMC is the central cockpit where the security consultant will spend most of his time. The
Read MoreThe idea for this article came to me after reading through a question from a visitor to this site. I
Read MoreTill a few years back Business Objects used to be a company whose products were used in many enterprise reporting
Read MoreIn all the previous articles on BW security, we have already looked the current method of BW security through analysis
Read MoreThe standard SAP authorization trace given by ST01 is not enough for troubleshooting security issues in BW reporting. A ST01
Read More