Authorization for doing IP

Hi,
I am trying to create a planning layout in the bex analyzer.
I inserted a button in the workbook and in properties, i have given execute planning function. When i try to assign the planning function, open dialog box appears with the following options
1.Find
2. History
3. Favourites
4. Infoarea.
When i click on the info area, it doesnt disply any of the info areas.
Is it authorization issue? do we need any specific authorizations to work in IP?
Thanks
Annie

Hi,
It's may be a problem with your roles. It lacks either S_RS_COMP/COMP1 or similar reporting Auth obj.
--Akashdeep

Similar Messages

  • User XIRWBUSER does not have authorization for message monitoring

    Hi All,
    In the Runtime WorkBench, when I choose the Message Monitoring, display Messages from Component Adapter Engine from Database, when I click on the start button, it shows me a error "User XIRWBUSER does not have authorization for message monitoring", how can I configure my xi to get the authorization for message monitoring of Adapter Engine? Thanks!
    Regards,
    Nick

    Hi Nick,
    Transaction PFCG. Enter the role you wish to check (SAP_XI_RWB_SERV_USER) and click on the display button.
    Check that the Authorizations tab is green. If it is not, then you might need to generate the auth profile. Also check the User tab. If it is not green, then you should do a User Comparison as well (just click on the button inside the tab).
    SAP Help URL:
    http://help.sap.com/saphelp_nw04s/helpdata/en/52/67151e439b11d1896f0000e8322d00/frameset.htm
    Cheers
    Manish

  • User does not have authorization for InfoProvider

    Hi,
         We are in BI 7.0 and want to display the data in the cube that I created and loaded data to. In RSA1, I am do a right click on the cube and select "display data". I am getting to selection screen and after selecting the output fields and executing, I am getting the following error:
    User XXX does not have authorization for InfoProvider ZFREDC
    The long text is like this:
    You do not have sufficient authorization
    Message no. EYE007
    Diagnosis
    You do not have sufficient authorization for the requested data records.
    Procedure
    Either select other data or get the required authorizations from your administrator.
    I did a authorization check in SU53 after I got the error and it says the last authorization check was successful.
    Can somebody suggest me what to do. If there are any authorization objects that I need to have in my role?
    Thanks.

    Hi,
    Be sure to have authorisation object S_RS_ICUBE assigned with at least activity 03 (execute) and subobject data and agregate for the respective cube(s) or infoarea(s).
    Regards, Patrick Rieken.
    Message was edited by:
            Patrick Rieken - BI-Formance B.V.

  • I need to deauthorize three computers I no longer own, but keep my computer authorization for my current computer and add a new laptop. Is there a way of doing this without having to unauthorize my current desktop which is my main music storage devic

    I just purchased a new Win 8.1 laptop and want to authorize it for my iTunes library. I operate this library on a Win 7 desktop. I have three other Windows computers that I no longer own which were authorized under my iTunes account, but I can't unauthorized them because they are broken or sold. I want to have Computer Authorization for just my current desktop running Win 7 and my new laptop operating Win 8.1. How can I selectively unauthorize a computer if I no longer have it in my possession, and if I have to unauthorize all of my computers, how do I get my iTunes library of music back onto my current desktop system?

    Deauthorizing the computer will not remove the content from your library. You deauthorize all, then authorize the ones you want. See this support document. Deauthorize your computer using iTunes - Apple Support

  • Why authorization for cost center groups does not worked ?

    hello all,
    I would like to give authorization for a CO report (S_ALR_87013625) based on authorization values : cost center groups.
    But, unfortunately, it doesn't work. I get a message : No authorization for x of x read records.
    Is it only possible to give authorization on standard hierarchy and cost center ?
    Please, help me
    Thanks and best regards

    hi,
    Run the su53 transaction.See what authorization was missing

  • Cancel a SD invoice error message "no authorization for transaction FB08"

    Hi Gurus,
    I am trying to cancel a SD invoice and am receiving the error message " no authorization for transaction FB08" is coming. Never has this happened in past, i have checked all the security authorizations also and they are in place. Accounting document status is showing as not cleared. Also, as per my understanding cancellation of invoice happens through VF11 which does not calls FB08. Please point out reasons as to why this could be happening and the possible solution thereof.
    regards
    Anmol Pareek

    Hi Anmol
    Once you got the error screen, immediately after that goto T code SU53 and expand all link. Take the screen shot and send it to your BASIS team to provide you proper access.
    Yes you are correct cancellation is done through VF11 but sometime some programs internally calls other T codes.
    take help of your basis team.

  • What happends when you give 2 groups with some of the same members different authorizations for a document

    Hello,
    I'm doing my internship at a litte Telekom company. I'm investigating how they can use MS SharePoint as their central place to put projectinformation. Now i've been thinking what happends when i do the following:
    Make one document library
    Add 2 groups to the Active Directory, group "A" with all the employees and group "B" with only four people working on a project. When i add a document to the document library and set the authorizations for the document as
    follows:
    Group B: Read/Write
    Group A: Read
    Does the people from group B still be able to edit the document, because they are also in group A?
    I don't have a test environment to test this myself.
    Why i want to know this? The company want's one place to place all their documents with projectinformation. This information is about different projects. You only wan't that people can change the specific document when they are working on the specific project
    where the document belongs to.  

    You get the union of permissions, so if one group allows access and the other not, you will get the union of both and therefore access. Of course, you can break security settings per library/folder or document, and specify new settings,
    if you need too.
    Kind regards,
    Margriet Bruggeman
    Lois & Clark IT Services
    web site: http://www.loisandclark.eu
    blog: http://www.sharepointdragons.com

  • What's the best way to do authorization for my app?

    The authorization situation is somewhat complicated for my app.
    Each component of the app is authorized based on not only the user, but also the page number, the value of at least one P0_ITEM.
    From what I've seen so far, there are two different options of setting the authorization for the component:
    1. Set its Condition
    2. Set its Security Authorization Scheme
    Here is my understanding for each (from my limited experience with APEX):
    1. Set its Condition
    + Can pass in parameters such as :APP_USER, page numebr, P0_ITEM. So I can just create one function that does all the authorization
    - Have to combine the SQL query with the component's non-authorization display conditions, if any.
    2. Set its Security Authorization Scheme
    + By name, it seems like it should be used for authorization
    - Cannot take in parameters relating to the page, such as the page number --> therefore I will need to create many different schemes, for all the different pages.
    #2 will end up with a long list of schemes (each with its own SQL queries) for different pages, which doesn't seem as efficient as #1 with far fewer SQL queries and just take in parameters.
    Which one should I pick?
    Thanks!

    953006 wrote:
    Thanks fac586 for the detailed response, and also everyone else who replied. You guys are very helpful and respond promptly. And we'd appreciate it if you changed "953006" into a real handle promptly.
    Andre mentioned using conditions:
    The way I work around this is to have two functions, one which is used at the page level as a normal authorization scheme and one which can be passed variables which is called as a Condition and the name of the item is one of the variables, in effect giving it "self awareness".But fac586 said:
    You can't pass "parameters" to authorization schemes. Use application items, APEX collections or application contexts to set current context before the authorization scheme is evaluated, and access these values in the functions.Does this mean, fac586, that we can avoid conditions altogether? No, it means that I prefer to use Authorization Schemes to control access to resources based on user privileges and security, and Conditions to control rendering and processing for functional reasons. Using the approach described above I have found it possible to maintain this separation.
    Say if a page has two buttons, Button_A and Button_B. Button_A has a set of requirements for displaying and Button_B has its own set of requirements (some of which are shared with Button_A). So far, the only way that I can see of using pure authorization is to write 2 different authorization schemes, and set the authorization schemes for the two buttons respectively.What's the problem with that? Consider a more concrete example using a standard APEX report/form pattern for customer maintenance. Page 6 contains the report, and page 7 is the maintenance form with P7_CREATE and P7_SAVE buttons. Only users entitled to create new customers should have access to P7_CREATE, and only users able to edit customers access to P7_SAVE. This would be controlled by the CREATE_CUSTOMER and EDIT_CUSTOMER authorization schemes respectively. Functionally, conditions are used to show P7_CREATE if the P7_CUSTOMER_ID is null, and P7_SAVE if it's not null. We don't mix non-functional security considerations with functional requirements.
    The CREATE_CUSTOMER and EDIT_CUSTOMER authorization schemes are of type PL/SQL Function Returning Boolean. These are implemented using package functions. Exactly how a user has create/edit customer privilege is determined in the package. Determinants that are shared by multiple schemes can be combined at this level. These implementations can be changed as necessary without requiring changes to the application.
    The authorization schemes are reusable across pages and components. On page 6, CREATE_CUSTOMER can be used on the "Create New Customer..." button; EDIT_CUSTOMER on the report column containing the "Edit" links.
    Each component of the app is authorized based on not only the user, but also the page number, the value of at least one P0_ITEM. So I guess this goes back to my original concern with Authorizations:
    [Using purely authorizations] will end up with a long list of schemes (each with its own SQL queries) for different pages [and page items] ....
    Re: VPD policies. Note that in the example above there's no need for the authorization schemes to "know" which pages/items are being evaluated. The P7_SAVE button and the page 6 link column are involved with the EDIT_CUSTOMER operation, so that authorization scheme is applied to them.

  • Customization of "No Authorization" for Query in BI!!!

    Hi,
    Have a query on when we get a no authorization for a query in BI. Can we customize the error message or create pop up in analyzer to show the user that he does not have access to a particular value like a Company Code etc.
    Also is it possible to show data to the user for which he is authorized even if he has put in fields to which he has no access.
    Thanks,
    Yogesh

    May be you can try Authorization Fill variable.
    To see what the user ID is Authorized to see use RSECADMIN (Only in BI7.0) and see for Error Logs under Analysis.
    AB

  • Error - No authorization for object while viewing transformations in BI 7.0

    Folks,
    In BI 7.0, In the Data flow diagram, when I had tried to click on the transformation sybmol, system is throwing an error message No authorization for object   (authorization object ) Message no. RS_EXCEPTION250
    Do I need to request for authorization to just view transformations or is this error something different ?
    Thanks

    Did  SU53 and below is theauthorization info. Does quality system usually not have access even to display/read transformations for func people ???
    Authorization check failed
      Object Class RS   Business Information Warehouse
        Authorization Obj. S_RS_DTP   Data Warehousing Workbench - Data Transfer Process
          Authorization Field ACTVT Activity
                                                                                    03
          Authorization Field RSONDTPSRC Source
                                                                                    DTP_46UAQF4V7BE5JR0I3HKLLC6D2
          Authorization Field RSONDTPTGT Target
                                                                                    ZSD_DEL
          Authorization Field RSSTDTPSRC Subtype of the Source
          Authorization Field RSSTDTPTGT Subtype of the Target
          Authorization Field RSTLDTPSRC Type of Source
                                                                                    DTPA
          Authorization Field RSTLDTPTGT Type of Target
                                                                                    ODSO
      User's Authorization Data xxxx
      Object Class RS         Business Information Warehouse
        Authorization Object S_RS_DTP   Data Warehousing Workbench - Data Transfer Process
          Authorizat. Z:GEFUNONC00 Data Warehousing Workbench - Data Transfer Process
            Profl. Z:GEFUNONC   Profile for role Z:GENAPO_FUNC_ONCALL
            Role Z:GENAPO_FUNC_ONCALL Generic APO Fucntional Oncall Role
            Authorization Field ACTVT Activity
                                                                                    03, 16, 23
            Authorization Field RSONDTPSRC Source
            Authorization Field RSONDTPTGT Target
            Authorization Field RSSTDTPSRC Subtype of the Source
                                                                                    ATTR, HIER, TEXT
            Authorization Field RSSTDTPTGT Subtype of the Target
                                                                                    ATTR, HIER, TEXT
            Authorization Field RSTLDTPSRC Type of Source
                                                                                    CUBE, IOBJ, ISET, ODSO, RSDS, TRCS
            Authorization Field RSTLDTPTGT Type of Target

  • RFC Lookup error :No RFC authorization for function module

    Hi All,
    I have created RFC in the PI system and enabled it as remote. I am working on PI7.1
    I have imported RFC into Repository.But when i am trying to execute RFC lookup function in the graphical mapping I am getting No RFC authorization for function module error.
    Unhandled RFC exception: <rfc:Z_MAIL_LOOKUP.Exception xmlns:rfc="urn:sap-com:document:sap:rfc:functions"><Name>RFC_ERROR_SYSTEM_FAILURE</Name><Text>No RFC authorization for function module Z_MAIL_LOOKUP.</Text><Message><ID>RFC_ERROR_SYSTEM_FAILURE</ID><Number>341</Number></Message><Attributes><V1>RFC_NO_AUTHORITY</V1></Attributes></rfc:Z_MAIL_LOOKUP.Exception> com.sap.aii.mapping.api.StreamTransformationException: Unhandled RFC exception: <rfc:Z_MAIL_LOOKUP.Exception xmlns:rfc="urn:sap-com:document:sap:rfc:functions"><Name>RFC_ERROR_SYSTEM_FAILURE</Name><Text>No RFC authorization for function module Z_MAIL_LOOKUP.</Text><Message><ID>RFC_ERROR_SYSTEM_FAILURE</ID><Number>341</Number></Message><Attributes><V1>RFC_NO_AUTHORITY</V1></Attributes></rfc:Z_MAIL_LOOKUP.Exception> at com.sap.aii.mappingtool.flib7.RfcLookup.cacheMore(RfcLookup.java:95) at com.sap.aii.mappingtool.tf7.rt.AMultiResIterator$MultiOutIterator.gotoNextContext(AMultiResIterator.java:95) at com.sap.aii.mappingtool.tf7.AMappingProgram.processNode(AMappingProgram.java:315) at com.sap.aii.mappingtool.tf7.AMappingProgram.processNode(AMappingProgram.java:406) at com.sap.aii.mappingtool.tf7.AMappingProgram.start(AMappingProgram.java:496) at com.sap.aii.mappingtool.tf7.Transformer.start(Transformer.java:133) at com.sap.aii.mappingtool.tf7.AMappingProgram.transform(AMappingProgram.java:626) at com.sap.aii.ibrep.server.mapping.exec.ExecuteXiMappingCommand.transformInternal(ExecuteXiMappingCommand.java:197) at com.sap.aii.ibrep.server.mapping.exec.ExecuteXiMappingCommand.execute(ExecuteXiMappingCommand.java:94) at com.sap.aii.ib.server.mapping.exec.CommandManager.execute(CommandManager.java:43) at com.sap.aii.ibrep.server.mapping.ServerMapService.execute(ServerMapService.java:40) at com.sap.aii.ibrep.server.mapping.MapServiceBean.execute(MapServiceBean.java:40) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25) at java.lang.reflect.Method.invoke(Method.java:585) at com.sap.engine.services.ejb3.runtime.impl.RequestInvocationContext.proceedFinal(RequestInvocationContext.java:43) at com.sap.engine.services.ejb3.runtime.impl.AbstractInvocationContext.proceed(AbstractInvocationContext.java:166) at com.sap.engine.services.ejb3.runtime.impl.Interceptors_StatesTransition.invoke(Interceptors_StatesTransition.java:19) at com.sap.engine.services.ejb3.runtime.impl.AbstractInvocationContext.proceed(AbstractInvocationContext.java:177) at com.sap.engine.services.ejb3.runtime.impl.Interceptors_Resource.invoke(Interceptors_Resource.java:71) at com.sap.engine.services.ejb3.runtime.impl.AbstractInvocationContext.proceed(AbstractInvocationContext.java:177) at com.sap.engine.services.ejb3.runtime.impl.Interceptors_Transaction.doWorkWithAttribute(Interceptors_Transaction.java:38) at com.sap.engine.services.ejb3.runtime.impl.Interceptors_Transaction.invoke(Interceptors_Transaction.java:22) at com.sap.engine.services.ejb3.runtime.impl.AbstractInvocationContext.proceed(AbstractInvocationContext.java:177) at com.sap.engine.services.ejb3.runtime.impl.AbstractInvocationContext.proceed(AbstractInvocationContext.java:189) at com.sap.engine.services.ejb3.runtime.impl.Interceptors_StatelessInstanceGetter.invoke(Interceptors_StatelessInstanceGetter.java:16) at com.sap.engine.services.ejb3.runtime.impl.AbstractInvocationContext.proceed(AbstractInvocationContext.java:177) at com.sap.engine.services.ejb3.runtime.impl.Interceptors_SecurityCheck.invoke(Interceptors_SecurityCheck.java:21) at com.sap.engine.services.ejb3.runtime.impl.AbstractInvocationContext.proceed(AbstractInvocationContext.java:177) at com.sap.engine.services.ejb3.runtime.impl.Interceptors_ExceptionTracer.invoke(Interceptors_ExceptionTracer.java:16) at com.sap.engine.services.ejb3.runtime.impl.AbstractInvocationContext.proceed(AbstractInvocationContext.java:177) at com.sap.engine.services.ejb3.runtime.impl.DefaultInvocationChainsManager.startChain(DefaultInvocationChainsManager.java:133) at com.sap.engine.services.ejb3.runtime.impl.DefaultEJBProxyInvocationHandler.invoke(DefaultEJBProxyInvocationHandler.java:164) at $Proxy1005_10002.execute(Unknown Source) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25) at java.lang.reflect.Method.invoke(Method.java:585) at com.sap.engine.services.rmi_p4.P4DynamicSkeleton.dispatch(P4DynamicSkeleton.java:234) at com.sap.engine.services.rmi_p4.DispatchImpl._runInternal(DispatchImpl.java:351) at com.sap.engine.services.rmi_p4.server.ServerDispatchImpl.run(ServerDispatchImpl.java:70) at com.sap.engine.services.rmi_p4.P4Message.process(P4Message.java:62) at com.sap.engine.services.rmi_p4.P4Message.execute(P4Message.java:37) at com.sap.engine.services.cross.fca.FCAConnectorImpl.executeRequest(FCAConnectorImpl.java:872) at com.sap.engine.services.rmi_p4.P4Message.process(P4Message.java:53) at com.sap.engine.services.cross.fca.MessageReader.run(MessageReader.java:58) at com.sap.engine.core.thread.execution.Executable.run(Executable.java:108) at com.sap.engine.core.thread.execution.CentralExecutor$SingleThread.run(CentralExecutor.java:304) Runtime exception when processing target-field mapping /ns0:MT_FileDummy/File; root message: Unhandled RFC exception: <rfc:Z_MAIL_LOOKUP.Exception xmlns:rfc="urn:sap-com:document:sap:rfc:functions"><Name>RFC_ERROR_SYSTEM_FAILURE</Name><Text>No RFC authorization for function module Z_MAIL_LOOKUP.</Text><Message><ID>RFC_ERROR_SYSTEM_FAILURE</ID><Number>341</Number></Message><Attributes><V1>RFC_NO_AUTHORITY</V1></Attributes></rfc:Z_MAIL_LOOKUP.Exception>
    13:42:37 End of test
    Edited by: Rams on Apr 17, 2009 1:43 PM

    Hi! Rams,
    I think the issue is related to Authentification Issue..Even though u did correctly please check once the below
    1) Check any Typo Erros are there while configuring or giving names in Lookups.
    2) please check Authorizations like ID and PWD and Sufficient Roles
    3) Also please check did u given paramters correctly while doing RFC look up I mean paramers , Binding parameters and RFC channel name and adapter type or Simple type it must be an  adapter
    4) In ID part while configuring Interface determinaition you need to give your RFC look Up name there also..Hence check whether u given or not if yes correctly or not
    5) Also remember one thing if your scenario is correct mostly you can know the result in mapping itself it seems while testing Message mapping and Interface mappings give your RFC look up paramters in the parameters tab present in TEST tab and later in Document tab give Input...and execute it works if it doesn;t works and if there is an issue with RFC you can get there only..ok
    Also go through the below document::
    [https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/20befc9a-aa72-2b10-ae9b-b0988791d457]
    I hope this will give u brief idea...
    Also check with basis while taking SAP_ALL authorization so that first u ill came to know whether issue is related to authentification or RFC module itself remote enabled and also do SXI_CACHE also ocne to refresh ESR and ID objects..
    Regards::
    Amar Srinivas Eli

  • 'Authorization for replace' sy002

    SAP System gives me this error in debbuging mode. I suppose it is something related to authorization when modifying the content of variables (which is what I was doing).
    What would be the problem ?
    Thanks in advance.

    > The message is 'No authorization for replace' - message type sy002.
    I am not logged on and still dont know which program you are debugging... The system might be throwing an error message which does not relate to the real cause. Unlikely... Most likely an authorizations issue. If I may be honest with you (no offense!) if you do not know which object controls debugging and what it does to a SAP system..., then I would personally not give you debug authority in a system (I also do not have any debug authority - it was removed from my roles at my request). Only in some lab systems... (an one or two temporary exceptions).
    > The change mode is not activated however I am supposed to be able to debug a program in Test System even changing the value of a specific variable defined in the program. In fact, I am allowed to debug the program but I can not change the value of a variable in debugging mode. (Perhaps it is because of the change mode status). That's why the system is showing me the error.
    So you cannot activate the change mode? Are you setting a break-point, a watch-point or are you running a it from the start in the debugger? Are you executing it in the debugger from the tcode, or from Se38 etc? It the "productive" test client, the system might also react differently (which release are you on and which SCC4 settings does that client have?).
    > Is it possible to change the authorization without having to make any more changes in the System?
    Don't do that. I would reject the development and ask the developer to join you for the debugging session to see why those variables are incorrect. Your debugging mthod (or mode) may be incorrect (likely), or, the developer will have to go back to the drawing board in a development system or sandbox (sort of equaly likely, depending on the developer).
    > The change mode can not be activated instead I want to grant access in order to be able to change the value of some varibles defined to see the results given.
    See above. Besides that, the developer should ideally have handled those exceptions so that you do not get an incorrect variable; you only get an incorrect output in display mode (and send their code back for a rework, or invite them over...).
    Hope that helps, sorry for the many questions...
    Julius

  • Customizing Authorization for Controlling

    Hello, Experts,
      I need to create a role with authorization for SPRO but only for the Controling branch.
    How do I do it ?
    Thank you !
    Rami Kleiman - HP

    Hi,
    DSK-  How do create configuration project ?
    Anil - Can you be more specific ? PFCG is transaction for creating roles.
    When I add SPRO to the role, it DOES NOT add all the authorization for
    the SPRO options.
    Thank you,
    Rami

  • I want authorization for SAP classes

    my company are provided computer courses.I want authorization for SAP classes.what are i doing for this process

    Hi,
    can you please reformulate your question? Are you looking to become an authorized training partner? If so which country?
    Thanks,
    Arnold

  • Auth Group for Accounting Doc and Account authorization for  Vendors

    Hi guys,
    I have question regarding Accounting Doc for Vendor and G/l Account.  I have a security client whree I build my business roles for end user but we we configuration client where all the functional focus wokring and doing configuration.  My questiion when I start creating business roles  and start going  into these authorization objects and filling up the field values (F_BKPF_BEK, F_BKPF_BES,  F_BKPF_BLA).
    I won't  see auth group that will be c reated by functional  cocus because they are working on configuration Client and they probably create auth group for above authorization objects in Config lcient and I'm building Roles in my security client. 
    If it is true what would be the best way to create business role.  I'm in realization face of the project  Should I build my roles in Config client?   Please advise.
    Thanks in advance
    Faisal

    What is the benefit of a "security client" in DEV? I don't get it...
    You anyway need to protect the namespace... and the authorizations for role development (SU24) and admin (PFCG).
    Anyway, you have closed your question so we can only lick our wounds now
    Cheers and good luck on your project (let is know how it goes if you stick around for long enough to experience a release upgrade...
    Julius

Maybe you are looking for

  • 0fi_ar_4 netduedate(netdt) value coming in RSA3 but not coming in BI PSA

    Hi all, i am using 0fi_ar_4, netduedate(netdt) value coming in RSA3 but not coming in BI PSA, in BI PSA there is 10-12 do cument there where netduedate is null while for same document we are getting the netduedate running from transaction RSA3, how?

  • SSAS Cube - Throws "attribute key not found" when the key exists

    Hi, I created a cube with 2 fact tables ( CabecNF and ItensNF ) and with some dimensions, in this case Cliente. When I proccess the cube it throws this error: Internal error: The operation terminated unsuccessfully. Errors in the OLAP storage engine:

  • Activity monitor won't launch

    It pops up for a second in the Dock and then disappears. Is there anyway to reinstall it? or trouble-shoot it? I repaired permissions but it didn't help.

  • Amount WRBTR in TCode FB60

    Hi all, i am working on BDC for Transaction Code FB60 Can anyone help me in BDC for this transaction. I have amount field name say wrbtr in the structure INVFO, it has the type CURR. But It_BDCDATA has field Fval of the type c with length 132. so it

  • Personal file not recognised

    Hello, I have put a file on that was created by someone I know, it comes up on my Ipod as an unknown album. How can I put the info on it so it is displayed. Cheers Phil