Use Authorization Objects to Provide Flexible BW Security

Use Authorization Objects to Provide Flexible BW Security

Published: 01/July/2004

Reading time: 22 mins

BW security is different and often more difficult to implement than R/3. The author explains how to secure the data in your BW system, focusing on several key points. He discusses authorization objects, transaction code components, and the relationship between them. Examples show you how to provide your users with a flexible and safe system....

This content is for Mastering SAP Premium Access and Mastering SAP Preferred Access members only.
Log In Join Now

More Resources