Re: Issues with Analysis Authorization checks in APO
have the RSD1 characteristics been compared to check they are are same in both systems Also, AAs have 3 mandatory characteristics (within BI system 7.4 release it did)0TCAACTVTActivity in Analysis...
View ArticleRe: Issues with Analysis Authorization checks in APO
Hi Colleen, Thank you for your response..Yes, RSD1 characteristics are the same across both systems.Also, the other Characteristics have been maintained too (same in both systems). I also tried looking...
View ArticleRe: Issues with Analysis Authorization checks in APO
Hi All, If it helps, in Quality: the Authorization checks are listed as: Subselection (Technical SUBNR) 1while in Production it checks Subselection (Technical SUBNR) 1 in one place, however where it...
View ArticleRe: Archivelink Signature Public Exponent
I do not have access to any system at the moment but if you see a cert that is used for signing by Archivelink then you should be able to export it from STRUST. Please check SAP doco. Cheers
View ArticleAudit log of customized table.
Dear experts, I need to trace log of some tables. In spro transacction there is one customize transacction KEDE. This transacction is used to define derivation rules and generates entries with tables...
View ArticleSAP Business Objects Password Expiry
Can anyone please assist with this issue: We currently have a SAP BOBJ 4.1 environment which is internet facing which authenticates via our BW 7.3 which is in the LAN. The issue arises when the...
View ArticleRe: SAP HR Security
You could also use eCATT and this could be transported&tested in Dev-QA-Prod stages too. IMHO you have more control using eCATT.Both eCATT and LSMW are not really to be used in production. Did...
View ArticleRe: Archivelink Signature Public Exponent
This procedure explains how to selet a certificate:Selecting Certificates - System Security - SAP Library After selecting you can export it. The following procedure explains how to import a...
View ArticleRe: PFCG Current version not generated
Did you try generating the profile? Generating Authorization Profiles - Identity Management - SAP Library
View ArticleRe: PFCG Current version not generated
Hi Jay, I think u might haven't generated the profile or may not have maintained the authorization data.Check once whether any open fields are there are not. Herewith is the attached error for your...
View Articleremove value from f4 search based on authorization
As we have multiple company code and other configuration related to it, we want to restrict the user not to view any different company code or other values related based on role and authorization, how...
View ArticleRe: SAP HR Security
Thank you Pradeep and Peter for bringing more information in this subject on my way.That is helpful for me. Regards Girish Almiya
View ArticleRe: remove value from f4 search based on authorization
Hi, speak to your development team about using search help exits. Documentation is here: Search Help Exit - ABAP Dictionary - SAP LibraryCheers
View ArticleSAP WM Cycle counting
Hi, We have configured Cycle counting process for Physical Inventory in WM. That is working good.our Key users are Feeling difficulty to identify when particular material is to be Physical...
View ArticleRe: How to find out which queries are being used ?
Hi, It's been a while since I've done this but one method is to use ST03N & look for the execution of programs with an AQ* prefix. The general structure is AQZZ/<query user group><query...
View ArticleRe: Archivelink Signature Public Exponent
Thanks, I managed to export the certificate.I am trying to extract some information from the certificate.
View ArticleRe: List of Users against their Inbox documents
Hello, Could anyone please tell me how to check what kind of documents are attached in user's inbox? Thanks,Pavan
View ArticleJCo and SNC
Hi, I want to build my own JCo client and secure it using SNC. The client can connect without SNC, so the basic setup should be good. I do have first of all a basic question how it is supposed to work:...
View ArticleInfluence about system performance by RAL, SAL
Hi, Experts.My team are going to use RAL(Read Access Log) and SAL(Security Audit Log)for logging users access to sensitive data.To meet the compliance, we have to log users' activity informationas...
View ArticleRe: Influence about system performance by RAL, SAL
Hi, I have been through measurement exercises in the past for SAL and have found no measurable performance influences. The only factor we could measure was log growth (which is very dependent on what...
View Article