Analysis Authorizations – Design
The idea for this article came to me after reading through a question from a visitor to this site. I
Read MoreLearn SAP Security & Authorizations Concepts
The idea for this article came to me after reading through a question from a visitor to this site. I
Read MoreTill a few years back Business Objects used to be a company whose products were used in many enterprise reporting
Read MoreIn all the previous articles on BW security, we have already looked the current method of BW security through analysis
Read MoreThe standard SAP authorization trace given by ST01 is not enough for troubleshooting security issues in BW reporting. A ST01
Read MoreThough creating a report in SAP BW is typically much easier than creating one in ABAP, most reporting users are
Read MoreAnalysis Authorizations are used to secure individual InfoObjects during execution of queries. If we get a requirement of the form
Read MoreAnalysis Authorizations are used to secure individual InfoObjects during execution of queries. If we get a requirement of the form
Read MoreSAP provides two different ways of securing OLAP data in BW. The first is the traditional, and till BW 3.5
Read MoreQuery Designer, as the name suggests, is an application within SAP BW which allows us to create new queries or
Read MoreBEX Analyzer or Business Explorer Analyzer or Simply BEX is the core reporting tool in SAP BW. It can be
Read More