Use Authorization Objects to Provide Flexible BW Security

Use Authorization Objects to Provide Flexible BW Security

Published: 01/July/2004

Reading time: 22 mins

BW security is different and often more difficult to implement than R/3. The author explains how to secure the data in your BW system, focusing on several key points. He discusses authorization objects, transaction code components, and the relationship between them. Examples show you how to provide your users with a flexible and safe system….

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here

More Resources