Analysis authorization - which objects are relevant

Hi
We use Analysis Authorization.
Multicube XXX contains authorization relevant objects A B C.
Is it possible that some of these objects arent used for analysis authorization. Where can I check it?
Thanks

Hi there,
I don't quite get your question...
If you go to transaction RSECADMIN and create a new authorization object give it a name and a description, if you click on the Infocube button and select the MultiProvider XXX, the system will open a window with all the InfoObjects that exist on that MultiProvider XXX and are marked as authorizationRelevant on the transaction RSD1, tab Business Explorer.
If you don't want some of those objects to be checked with the authorizations, you have two ways:
1. Either you uncheck the option of authorizationRelevant for those InfoObjects in transaction RSD1 tab Business Explorer, but this will afect not only the MultiProvider XXX, but all the InfoProviders were that particular InfoObject is used, will never be checked for authorization purposes.
2. Create a new authorization object in RSECADMIN and click on the InfoCube button, select the MultiProvider XXX and choose only the InfoObjects you want to bypass the authorization for that MultiProvider. Grant * values for all those InfoObjects and click on the butto of special characteristics (button at the left of the button Infocube) and for the entry 0TCAIPROV restrict it to I EQ XXX (so that only the MultiProvider XXX will be afected by that authorization object). This will grant * all authorization values for those InfoObjects only for the MultiProvider XXX, so these InfoObjects will never need authorization values whenever you're using a query(ies) over that MultiProvider.
Hope this helps,
Regards,
Diogo.

Similar Messages

  • How to find out which objects are at the end of the datafiles

    My Scenario is having a tablespace of 65G but the data is 5G and that is at the end of datafile for that we are not able to resize the datafile our though is to find out what are the objects at that end of datafiles and will either alter move <owner.tablename> move or alter index <owner.index> rebuld online.
    For that how to find out which objects are at the end of the datafiles.

    >
    My Scenario is having a tablespace of 65G but the data is 5G and that is at the end of datafile for that we are not able to resize the datafile our though is to find out what are the objects at that end of datafiles and will either alter move <owner.tablename> move or alter index <owner.index> rebuld online.
    For that how to find out which objects are at the end of the datafiles.
    >
    You may want to copy this and add it to your toolkit
    See 'What's at the End of the File?' in this Tom Kyte article from the Sept 2004 Oracle Magazine
    http://www.oracle.com/technetwork/issue-archive/o54asktom-086284.html
    And this AskTom blog shows you how to generate a script containing ALTER statements toresize your datafiles to the smallest possible. You can 'pick and choose' from the ALTER statements to do what you want.
    Then of course, you can use techniques from this article by Oracle ACE, and noted author, Jonathan Lewis
    http://jonathanlewis.wordpress.com/2010/02/06/shrink-tablespace/

  • Which objects are recorded in a TBOM?

    Hello all,
    In a dynamic recording of the TBOM for the BPCA, what level of objects is recorded?  For example, does it capture every field on the screen?  Does it capture a field even if the user recording it does not click onto that field?  Does it record fields in tabs that the user did not view?
    We are trying to figure out how detailed we have to be in recording these TBOMs to catch the information we want.
    Thanks,
    Michele

    Hi Michele,
    Please have in mind that during the dynamic TBOM creation all objects
    that are executed/touched during the execution of the transaction are
    recorded. You can look at which objects are in the TBOM by cklicking on
    the 'Display TBOM content' icon on the TBOM screen in the project.
    You can also check whether TBOMS for your project have
    been recorded.
    You can do this in transaction SOLAR_EVAL by executing the report
    'Test -> Business Process Change Analyzer - TBOM Analyzer' for
    your project.
    The following document explains all necessary steps for BPCA in detail:
    https://websmp107.sap-ag.de/~sapidb/011000358700000932192009E
    Kind regards,
    Fabricius

  • Which upgrades are relevant for me?

    Hi all.
    I am going to order the new iMac 21,5" 2.9 GHz and I need some help figuring out which upgrades are relevant for me.
    I am going to use the iMac for the following:
    - Webdesign (my profession)
    - Photoshop and perhaps other Adobe applications
    - Lots and lots of multitasking and many tabs in browsers
    - Screen Flow application (screen recording software)
    - Dual boot with Windows 7
    - Time Capsule backups
    - Gaming (Sims 3 primarily - in Windows 7)
    I want it to be "future proof", but since hyperthreading isn't widely used in applications yet and people write that the majority of people never go beyond 4GB of RAM i'm onsure whether I should upgrade the CPU and RAM.
    Also, since the iMac 21,5" is not user-upgradeable after you get it, I want to make sure that I don't end up having a slow computer that I wish I would have made better/faster. I just want it to function fast and smooth. Today I have a MBP 15" medio 2009, 2.66 Ghz Intel Core 2 Duo, 4GB RAM, which I think performs overall well but is a bit slow sometimes.
    The only upgrade I seem sure of for now is the 1TB Fusion Drive.
    Thanks in advance!

    Although I am sure you have seen all this ... this is the formal description of that machine. Apple (United Kingdom) - iMac - Technical Specifications
    I cannot answer you questions about the specific tasks you plan to use it for; they are simply outside of my knowledge base, but you do raise points about being 'future proof', as you describe it, and I am afraid Apple is no more future proof than any other computer.  It is a fact that the sales of Apple machines rely on upgrading at periodic intervals, often using upgrades that were designed and known about two years before.   That, I'm afraid, is business.
    As far as the RAM is concerned you will have to decide between 8 GB and 16 GB when you order it as it cannot be RAM increased afterwards.   (The 27" can, I understand.
    Very much based on talk within the forums but I hope this is of some help to you.

  • Which objects are in buffer cache? How much space is each taking up?

    Hi All,
    I am on Oracle v 11.2.0.2 (64 bit) RedHat.
    I want to find out which objects have presence in buffer cache? and how much space each object is taking up in buffer cache?
    I googled around and found few queries based on view x$bh. But when tried to run those on my database, I cannot find x$bh (the user has SELECT_CATALOG_ROLE privilege). Is there any other view holding same information as x$bh?
    Thanks in advance.

    Be careful, there is quite a bit of misinformation floating about the net about querying v$bh. What exactly do you want to know, that is, what do you want a user to do with the information?
    Edit: Oh, you said x... Why the x$bh view does not exist?
    Edited by: jgarry on May 16, 2012 2:58 PM

  • Which settings are relevant that a product is planned in SCM?

    Some products should be planned in APO. Therefore a MRP type ZX is created in the ERP customizing.
    There is a field called planning method in the customizing for the MRP type.
    This field has the value 1, which means planned by external system.
    Are there any other settings necessary that the MRP doesn't run any longer in ERP?
    Thanks a lot for help.

    1,
    I guess you didn't have time to read the F1 help on this field.
    If you wish to create a custom MRP type that will cause the materials will be excluded by MRP, then you have to select an appropriate MRP Procedure in OMDQ.   Procedure 'N' or "X" are good candidates, depending upon what your requirements are.
    Best Regards,
    DB49

  • Analysis Authorization and relates issue

    Hello all,
    I am in the midst of designing authorizations using RSECADMIN transaction.
    We have a set of 50 different queries.
    In our cube, there are 5 different characteristics, which are authorization relevent.
    So, in RSECADMIN, i have created one analysis auth role, included all special and authorization relevent characteristics and maintained the appropriate values.
    But when i execute the queries,the desired output is not coming.
    - Do i need to create authorization varaibles and included in all my queries ?
    - Without including the auth.variabes in queries, is there any other way to restrict the users ?
    I though, by assigning the parameters in RSECADMIN, the query will automatically filter the data.
    Can you pls help ?
    We are on SP19.

    Hi,
    First of all, The query is always based on a InfoCube. Now, you have 50 different Queries which is based on this InfoCube if I am not wrong as you are not getting any authorization error.
    For a query to run, the user should have access to 1. Query, 2. Infocube and 3. Data(All Auth Relevant + 4 Special Objects)
    Authorization relevant objects are for an InfoCube which means that these objects are important or key fields for the infocube.
    You say that in your case, you have 5 Auth relevant objects which means they are important. But please note that there are more infoObjects in that InfoCube.
    Now, when you go to the query design, you can restrict on any object in the InfoCube but it makes more sense that you do it on one of those authorization relevant objects as you have to specify that in the Analysis Authorization where the system can pick up the data easily and give the output.
    Again, on the query design, if you have designed the query with processing type "Authorization", then it would automatically pick up (What you mentioned as automatic filtering) the value from the Analysis Authorization which is contained in the user's role for that query which otherwise gives a wide variety of options to chose from where the user has to choose the correct one.
    To get the desired output, all the correct variables should be included in the query and user should have access to all the three mentioned above.
    May be this gives a clear picture.
    Regards,
    Prasanna
    Edited by: Prasanna Nagaraja on Sep 11, 2009 11:40 PM

  • Analysis Authorization

    We have a need to restrict the majority of our users from seeing transactions of few business accounts.  The restricted accounts can be based on a specific gl account, fund range, or they can be a combination of a fund and cost center (or fund and fund center).  Until we become more familiar with this process, we are only concerned with 0FUND and it's restricted ranges, so below my question is just about 0FUND.. 
    We need to explore and understand what abilities analysis authorizations give us. I have done a lot of reading, but so far all of the pieces are not falling into place.  I am on the BW team and working with the security team to get this accomplished.  At this time whereever 0FUND is located in an existing authorization, it has a "*" to indicate the user gets all values.  We have already gone live; will every authorization currently in use with 0FUND have to be changed?  Is there a detailed How-To located somewhere?
    thank you in advance for your help.
    LLK

    Hi Linda,
    SUIM - User Information System is a TRANSACTION CODE. (Its not SUM)
    Execute SUIM and follow the path mentioned below:
    SUIM -> User -> Users by complex selection criteria -> Users by complex selection criteria. In the Authorization object field mention S_RS_AUTH and in the field mention the name of the analysis authorization which you want to search for.
    The output would be users who have access to the analysis authorization that you gave in the search criteria.
    Since in your case there would be a lot of analysis authorizations with * in 0FUND,  it would be better to identify the roles first and then the users assigned to these roles.
    You can identify the roles by browsing the table SE16. Just give the object name and all the analysis authorizations in the multiple selection on appropriate fields. Then use SUIM to identify the users who have access to these roles.
    SUIM -> User -> Users by complex selection criteria -> By Roles.
    You can also display the roles in this report by pressing the Roles button at the top. Apply filter to restrict the roles to your identified roles.
    Thats it !
    Regards
    Sachin

  • How to get Query Results based on Analysis Authorization Ranges????

    Hi Experts,
    I have gone through the lot of SDN Links, however not able to find the answer to my question.
    I have an Authorization Issue, “NO Authorization “
    Error : EYE 007 ( Insufficient Authorizations )
    <b>Here is the issue:</b>
    Need to see the complete query result when I gave the range in Analysis Authorization for Controlling Area 001-005. Controlling Area is auth relevant and right now a variable is inserted in the query for it. If I select Controlling Area 001, the result for Controlling Area 001 is displayed in query. If 002 then also displayed. If I do not enter anything, then I get the <b>Eye 007 error message</b>.
    I am not sure how do I display/authorize the entire result in the query for all the Controlling Areas, I have authorized user to see??
    <b>Its really urgent, please help..!</b>
    Here are the logs:
    Authorization Check Log
    Date and Execution Time (Local Server)
    Execution Date: 06.09.2007
    Execution Time: 14:48:41
    Executed Query: 0CCA_C11/GBCCA_MP01_Q0002_AP
    Executed by User ZBI_TEST_001
    Executed with Analysis Authorizations of Another User ZBI_TEST_001
      InfoProvider Check  
    Building the Buffer...
    ...Buffer Built
    Are there authorizations for accessing InfoProvider 0CCA_C11 with activity 03?
    Authorization exists for general access to InfoProvider 0CCA_C11 with activity 03 
      InfoProvider Check  
    Authorization exists for general access to InfoProvider 0CCA_C11 with activity 03 
      Relevant Characteristics for Detailed Authorization Check  
    (Characteristics with Full Authorization Are Not Listed!)
      List of Effective Authorization-Relevant Characteristics for InfoProvider 0CCA_C11:  
    0CO_AREA 
    0TCAACTVT 
      Relevant Characteristics for Detailed Authorization Check  
    (Characteristics with Full Authorization Are Not Listed!)
      List of Effective Authorization-Relevant Characteristics for InfoProvider :  
    List Is Empty:
      There Are No Characteristics That Have to Be Checked in Detail  
      Authorization Check  
      Detail Check for InfoProvider 0CCA_C11  
      Preprocessing:  
    Selection Checked for Consistency, Preprocessed and Supplemented As Needed
    Subselection (Technical SUBNR) 1
    Check Node Definitions and Value Authorizations...
    Node- and Value Authorizations Are OK
    End of Preprocessing
    Filling the Buffer...
    ...Buffer Filled
      Main Check:  
      Subselection (Technical SUBNR) 1  
    Supplementation of Selection for Aggregated Characteristics
      No Check for Aggregation Authorization Required  
    Following Set Is Checked  Comparison with Following Authorized Set  Result  Remaining Set 
    Characteristic  Contents 
    0CO_AREA
    0TCAACTVT
    SQL Format:
    CO_AREA = '0003'
    AND TCAACTVT = '03'
    Characteristic  Contents 
    0CO_AREA  I BT 0001 0005
    0TCAACTVT  I EQ 03
    I EQ 16
    Authorized   
      Subselection (SUBNR) Is Authorized  
      Authorization Check Complete  
      Authorization Check  
      Detail Check for InfoProvider 0CCA_C11  
      Preprocessing:  
    Selection Checked for Consistency, Preprocessed and Supplemented As Needed
    Subselection (Technical SUBNR) 1
    Check Node Definitions and Value Authorizations...
    Node- and Value Authorizations Are OK
    End of Preprocessing
    Filling the Buffer...
    ...Buffer Filled
      Main Check:  
      Subselection (Technical SUBNR) 1  
    Supplementation of Selection for Aggregated Characteristics
      No Check for Aggregation Authorization Required  
    Following Set Is Checked  Comparison with Following Authorized Set  Result  Remaining Set 
    Characteristic  Contents 
    0CO_AREA
    0TCAACTVT
    SQL Format:
    TCAACTVT = '03'
    Characteristic  Contents 
    0CO_AREA  I BT 0001 0005
    0TCAACTVT  I EQ 03
    I EQ 16
    Partially or Fully Authorized (Intersection)   Characteristic  Contents 
    0CO_AREA
    0TCAACTVT
    SQL Format:
    ( CO_AREA < '0001'
    OR CO_AREA > '0005' )
    AND TCAACTVT = '03'
    Value selection partially authorized. Check of remainder at end
    Following Set Is Checked  Comparison with Following Authorized Set  Result  Remaining Set 
    Characteristic  Contents 
    0CO_AREA
    0TCAACTVT
    SQL Format:
    ( CO_AREA < '0001'
    OR CO_AREA > '0005' )
    AND TCAACTVT = '03'
    Characteristic  Contents 
    0CO_AREA  I BT 0001 0005
    0TCAACTVT  I EQ 03
    I EQ 16
    Not Authorized   
    All Authorizations Tested
      Message EYE007: You do not have sufficient authorization  
      No Sufficient Authorization for This Subselection (SUBNR)  
    Following CHANMIDs Are Affected:
    184 ( 0CO_AREA )
      Authorization Check Complete  

    Hi,
        Have you defined the vaule for 0CO_AREA as BT 001-005 in you Authorization for 0CO_AREA.Also how have you defined your Authorization Variable on the query? Have you define as select options or interval? I thing you need to define it as interval or select options.
    Hope it helps,
    Cheers,
    Balaji

  • How to implement complex analysis authorizations in simple way

    Hi All,
    I need to create some analysis authorizations with long list of single values for a characteristics. For example, we have multiple set up of company codes (APAC, EAME, AMERICAS, etc) and each set contains 150 - 200 company codes in it. Now we have multiple combinations of company code set and geographies. In short, we will have multiple analysis authorizations and each will have one or two set of company codes and some geographies.
    I can create the analysis authorizations for the first time, by putting individual values in the respective characteristics. That would be a big task but can be done. But the problem is about ongoing maintenance. In future, if a new company code is added to lets say APAC companies, then we will have to update all analysis authorizations which contains APAC company code and that would be huge number of AAs due to the complexity of business architecture.
    Could anyone please suggest if it is possbile (and how) to do below or similar, or have any other better approach (using BW7.4)
    - We would create a group (or set) of company codes. Lets say would create a group APAC_Comp_Code and add all APAC related company codes in it. This would be repeated for all set of compant codes.
    - While creating analysis authorizatons, I would not assign any individual company code value in characteristic, instead put APA_Comp_Code inside the characteristic 0COMP_CODE.
    - If I need to put multiple set of company codes inside 0COMP_CODE, I will just put the corresponding group name, not the invidual values.
    The benefit would be that in future if I need to add a new company code to APAC, I would just have to update this group APAC_Comp_Code. I will not have to maintain the analysis authorizations.
    Please let me know if this is possible or if there is any other way to implement the requirement with simpler maintenance.
    Thanks
    Nitesh Gupta

    Hi Nitesh,
    From what you describe, this would be a good case to use variables in your analysis authorisations. You can specify a variable value for the BUKRS field and have a couple of options to populate the values which are picked up in the query execution.
    You will need to ensure that you activate the istep to read customer exit variables and have the query variable set as customer-exit. Once those are complete, you can create a custom table to maintain the mapping of groups to company codes, or to read the company codes directly from your ERP system (if you want to base authorisations on what the users can see in ERP) and populate the table with those values.
    However you populate the value to the variable, I think this approach will get you closer to minimal maintenance going forward. Enhancement RSR00001 should be implemented, some help documentation for this below
    http://help.sap.com/saphelp_nw70/helpdata/en/1d/ca10d858c2e949ba4a152c44f8128a/content.htm
    Hope this helps,
    Tom

  • Role and Analysis Authorization Transport

    Dear Experts,
    I'm working with migration authorization project from 3.5 to 7.0. My doubt is when migrate in development enviroment enhancement each whith join S_RS_AUTH with Analysis Authorization which the role doesn't have any users assigning and transport to test enviroment where have a same role with user assigning. Do lose the user assign?
    Thank for all,
    Luis

    Hi,
    I think it will orverwrite the Role. If you want to lock the target system against import of user assignments, you can goto sm30 (Table - PRGN_CUST). Make an entry - USER_REL_IMPORT (value - NO).
    Thanks

  • BI 7 Authorizations: Business Content and usage of which Objects?

    Good day
    I am busy with the BI 7 Analysis Authorizations concept. I have gone through SDN as well as other sites and obtained numerous guidelines for applying these authorizations. I will not be utilising the migration tool as I will be creating the new analysis authorisations from scratch.
    I have replicated the datasources in the myself system.
    In ALL documentation it is stated that business content must be activated for objects u20180TCAu2019 and u20180TCTu2019, which I have a problem with.
    I do not have a problem with the related InfoObjects and activation.
    What I have seen from the metadata repository is:
    InfoCubes
    u20180TCA_HIEu2019, u20180TCA_UAu2019 and u20180TCA_VALu2019 (These are all cubes without datasources, transfer rules, TRF or DTP etc)
    DSOu2019s
    u20180TCA_DS01u2019 to *DS05u2019u2026. (These are all templates without datasources, transfer rules, TRF or DTP etc)
    Also DSOu2019s u2018ZTA_DS01u2019 and u2018ZTA_DS02u2019, not part of the 0TCA* and 0TCT* selection. Are these two necessary?
    My question(s) are:
    1)     What I want to know is how many DSOu2019s and Infocubes must be activated to ensure complete installation?
    2)     Why do the Cubes and template DSOu2019s (0TCA* and 0TCT*,) not display any datasources, TRF, transfer rules or DTPu2019s at all?
    3)     Why are DSOu2019s u2018ZTA_DS01u2019 and u2018ZTA_DS01u2019 involved if no-one has ever mentioned them?
    Please assist. I am very confused at this stage!
    Thanks in advance
    Cj

    Hi Cornelius,
    as you already mentioned in a previous Thread, you're new in bi 7.0 auth, check this out:
    http://www.mariewagener.de/node/135
    and the famous note  Note 1000004 - Merging and optimizing analysis authorizations
    Best,
    Maik

  • Analysis Authorization Object not working

    Hi Gurus,
    I m working on BI 7.0, I have created an analysis authorization object zz_div for 0DIVISION characteristic.
    For a given report i want a given user to view only data for '32' and '33' 0DIVISION.
    I have followed the below steps but still the report shows all data instead of restricted one.
    1)RSECADMIN -> Maintenance ->zz_div ->Create
    2) Add 0DIVISION in Auth structure , and in details 
    I     EQ     32
    I     EQ     33
    3) Add 0TCAIPROV with I     EQ     0SD_C03
    4) Add 0TCAACTVT, 0TCAKYFNM, 0TCAVALID,  this having details as
    I     CP     *
    5) Then in User tab -> Assignment -> User -> Change-> Inserted ZZ_DIV-> Save
    6) In Query created a Authorization variable(with no input prompt) and restricted 0DIVISION.
    Following are the authorization object in that user's Role (Reporting Only)
    S_RFC 
    S_TCODE
    S_GUI
    S_BDS_D  
    S_BDS_DS 
    S_OC_SEND
    S_RS_AUTH - only having zz_div
    S_RS_COMP
    S_RS_COMP1
    S_RS_ICUBE
    S_RS_RSTT
    S_RS_TOOLS
    S_RS_PARAM
    I have surfed lots of thread for this issue but not getting a solution
    Tell me what i m missing in above or any additional setting need before creating analysis authorization
    Edited by: Sonal Patel on Apr 18, 2009 8:10 AM

    Hi
    Thanks a Ton for ur reply
    I have checked in SPRO : Analysis Authorization
    where the authorization mode is " OLD obsolete Concept With RSR  Authorization Objects "
    We have to do the same in Production system .Can u please how its going to effect to others authorizations if change it to New Concept
    Thanks
    Sonal....

  • Authorizations for which transactions are required in BW?

    Hi,
    Can any ony please give some information regarding
    Authorizations for which transactions are required in BW Production Support?
    Regards,
    Aryan

    Hi Aryan,
    Authorizations for the following transactions are required in BW
    1. RSA1
    2. SM37
    3. ST22
    4. ST04
    5. SE38
    6. SE37
    7. SM12
    8. RSKC
    9. SM51
    10. RSRV
    11.RSPC
    13.RSMON
    The Process Chain Maintenance (transaction RSPC) is used to define, change and view process chains.
    Upload Monitor (transaction RSMO or RSRQ (if the request is known)
    The Workload Monitor (transaction ST03) shows important overall key performance indicators (KPIs) for the system performance
    The OS Monitor (transaction ST06) gives you an overview on the current CPU, memory, I/O and network load on an application server instance.
    The database monitor (transaction ST04) checks important performance indicators in the database, such as database size, database buffer quality and database indices.
    The SQL trace (transaction ST05) records all activities on the database and enables you to check long runtimes on a DB table or several similar accesses to the same data.
    The ABAP runtime analysis (transaction SE30)
    The Cache Monitor (accessible with transaction RSRCACHE or from RSRT) shows among other things the cache size and the currently cached queries. The Export/Import Shared buffer determines the cache size; it should be at least 40MB.
    ****Assign Points If Helpful****
    Regards,
    Ravikanth

  • Impact Analysis: How to trace which objects and tables used in a report?

    Impact Analysis: How to trace which Webi objects and tables used in a report?
    Currently, our company have been using BO Webi as our ad-hoc and reporting tool for over a year now.  Past several months, we've been pushing our power users to develop their own report, and started to notice that we loss track off which data (tables, columns, ... , BO objects) being used where and by whom.   The BI team now spend more time tracing through reports manually, instead of designing Universe.
    After consulted with our local  SAP  technical sale, they said the only solution is to buy BO's ETL (Data Integration) and
    Metadata Management tool, which price starting from $300K per CPU.  I suppose that is NOT the right solution; however, we have not found one yet.  Some executives believe Cognos (now by IBM) would provide a better BI solution as we scale.
    If anyone know, please provide (1) Impact Analysis method: How to trace which Webi objects and tables used in a report? and (2) Does Cognos provide better impact analysis method without a heavy spending?
    Thank you very much,
    Ed
    Edited by: EdPC-SCB on Sep 8, 2009 3:56 PM

    EdPC-SCB,
    have you tried enabling auditing?
    - Yes, audit log only shows user's activities which isn't useful for us. Please let us know any audit log that might be helpful .
    For most of the servers listed in the CMC there is an "Audit" tab.  I'd say if you have the disk space in your database for Auditor available, then if in doubt turn it on (at least for a while) to see if it exposes what you are seeking to find out --that'd be the quickest way.  The documentation (xir2_bip_auditor_en.pdf) doesn't offer much in helping you to see a correlation between ticking on an Audit option in a Server and how it will populate in the Auditor DB -- most of us just hunt and peck until we get what we want.  Once you have the good stuff in each of the Servers ticked on you'll be able to track down which report recieves which object.  To help youself out initially, you should run every report that you can find so Auditor will get seeded.
    thanks,
    John

Maybe you are looking for