SAP Authentication in CMC
Till now we have created users and group in the CMC and mapped these groups to application and content rights.
Read MoreLearn SAP Security & Authorizations Concepts
Till now we have created users and group in the CMC and mapped these groups to application and content rights.
Read MoreIn all the previous articles on BW security, we have already looked the current method of BW security through analysis
Read MoreThe standard SAP authorization trace given by ST01 is not enough for troubleshooting security issues in BW reporting. A ST01
Read MoreThough creating a report in SAP BW is typically much easier than creating one in ABAP, most reporting users are
Read MoreAnalysis Authorizations are used to secure individual InfoObjects during execution of queries. If we get a requirement of the form
Read MoreAnalysis Authorizations are used to secure individual InfoObjects during execution of queries. If we get a requirement of the form
Read MoreSAP provides two different ways of securing OLAP data in BW. The first is the traditional, and till BW 3.5
Read MoreQuery Designer, as the name suggests, is an application within SAP BW which allows us to create new queries or
Read MoreBEX Analyzer or Business Explorer Analyzer or Simply BEX is the core reporting tool in SAP BW. It can be
Read MoreIn the present article, we will explore some of the common transactions/tools used in SAP BW. By no means is
Read More