DIfference between BW and R/3 Security

Hi
Please tell me whats the difference between BW and R/3 Security
Thanks

Hi,
The main difference is that, in R/3 the first line of defence it S_TCODE, i mean its completely based on Transaction.
Where as B/W is completely object based i.e, it deals with securing Infoobjetcs, Infocubes, ODS, BW Queries, etc....
For more ingormation on BW Seecurity, please visit:
http://www.*********************/bw_security/bw_security.htm
Hope it helps.
Please award points if it is useful.
thanks & regards,
santosh

Similar Messages

  • What is the difference between "Replace" and "Replace by Security"

    Hi all,
    I am implementing FDM to Load data to HFM, I set them up with a proper security on the shared service and FDM. When I load data to HFM from FDM, there are 4 options to load data. (Replace, Merge, Accumulate, Replace by Security)
    A document states that
    Replace: Clears all account values from the target application, and replaces that the data in the application with the data in the load file.
    Replace by Security: Loads data to the target application only for members to which you have access.
    However, even if I used “Replace”, it worked with security which I set.
    Does anyone know what the difference between “Replace” and “Replace by Security”?
    Is there any way that FDM works without security?
    Thanks in advance
    taku

    The fact both methods are producing the same results will either be coincidence or perhaps because you are mis-interpreting the difference between the 2. When you run a Replace HFM will clear out all data based on the combination of Scenario, Year, Period, Entity and Value dimensions it does not care if you have set up security classes which may restrict access to any of the other dimensions i.e. Account, Custom1 thru 4. When you use Replace By Security HFM will still clear on the original criteria but it will respect security class restrictions set up on the other dimensions e.g. if you are assigned to a security class which is restricted to accessing only a certain subset of accounts, HFM will not clear data fro the accounts you don't have access to when you use Replace By Security

  • Difference between HFM and Essbase user security in 9.3.1 version

    Hi,
    Could any one explain the differences between Hyperion Essbase and HFM security setup using HSS in 9.3.1
    Thanks
    Edited by: user10305642 on Jul 13, 2009 12:39 AM

    HFM and Essbase security is totally different... HFM uses security classes while Essbase uses security filters.
    The way you assign security is also different.
    HFM also has more roles than Essbase.
    You will find further info in the Security Administration Guide:
    http://download.oracle.com/docs/cd/E10530_01/doc/epm.931/hyp_security_guide.pdf
    Hiope this helps,
    Seb

  • Difference between Structural and Org. Based Security

    Hi
       Could anyone please explain the difference between Structural and Org. based security
    Also could anyone please point to relevant documents.
    Thanks

    Structural authorization:
    ex: assigning roles to position and not to userids.. Listed below are some links that may help you to get started in understanding "Structural authorization".
    http://www.sap-img.com/human/structural-authorization-vs-role-authorization.htm
    http://www.sap-press.de/katalog/buecher/inhaltsverzeichnis/gp/titelID-1071
    https://websmp205.sap-ag.de/~form/ehandler?_APP=00200682500000001337&_EVENT=DISPLAY&COURSE=ADM940
    HB

  • What's the security difference between WPA and WPA2 Personal?

    In order to get my G4 iMac (OS 10.4.11) onto my new AEBS(b/g/n) wi-fi network, I had to drop the network security down from WPA2 Personal to WPA/WPA2 Personal.
    What are the potential security risks in this mode? I know that WEP is no longer secure, so I'm concerned about WPA also being vulnerable.
    If there's a good online explanation of these security differences (not necessarily Apple-only), you just give me that link.
    Thanks

    Hi,
    Summary:
    1.WPA2 is the improved version of WPA
    2.WPA only supports TKIP encryption while WPA2 supports AES
    3.Theoretically, WPA2 is not hackable while WPA is
    4.WPA2 requires more processing power than WPA
    http://www.differencebetween.net/technology/difference-between-wpa-and-wpa2/

  • Security Profiles - Difference between SYSTEM and TENANT admin user?

    Hi,
    In the OnDemand Enterprise workbook, some defualt security profiles have been configured.  This includes one called 'Tenant Admin'.   When I look in the system there is also a profiule called 'System Admin'.  Could somebody please explan the differences between system and tenant regarding these profiles?   I assume we shoul drarely use System Admin, and Tenant Admin is the safer option?
    Thanks
    John

    Hi,
    As you mentioned there are 2 status can be maintained for documents like Equipment Master, Notification, Maintenance Order & other important business documents.
    In case, client feels that system status is not enough to capture the details of the object, then user status can be used.
    System statuses will be updated automatically based on business transactions which will be done on SAP.
    For example, once the equipment is created, System status would CRTD (Created). If you install the same to some superior equipment or FL, then status would be INST (Installed).
    If you keeping that equipment in Spare, then for that, you have to maintain separate User Status like AVLB (Available in Stock / Spare) so that through IH08, by using User status, you can the report which is available as spare.
    These user status as per the name, should be updated by the user manually.
    Regards,
    Maheswaran.

  • What is the difference between apps and applications?

    I have an application that I've been running on my older Mac. Now that I have a new MacBook Pro, I have to reinstall new software that is compatible. When I go to the vendor website I see an application I can download or a link to the Mac App Store. Is an application different than an app? When should you download them from a vendor website and when should you go to the app store? Do apps end up in the Launchpad and an application in your Applications folder? I can't seem to find information on what is the distinction. Are they actually two different things? Any help would be appreciated.

    No difference between apps and applications. If you download the app from the Apple AppsStore you have better security and a conveninet place to have all your downloads. Nothing wrong with downloading from a trusted developer though.
    EDIT: Yes they will either wind up in your Download folder as  a .dmg you will have to double-click on to install, or most app store apps will install to your Applications folder.

  • Difference between RAC and MySQL Cluster !

    Difference between RAC and MySQL Cluster
    Please write me in well explanation , with examples , needed useful link and all other stuffs.
    (1)Italian dealers/distributors for MySQL
    (2)Difference between RAC and MySQL Cluster
    (3)Pricing about MySQL and PostgreSQL
    (4)How and which type / Way to deliver support by MySQL
    (5)Security features about MySQL Vs Oracle
    (6)Management Console
    MySQL Vs Oracle
    Thanks in advance !
    MySQL Cluster

    Ha ha, most amusing.
    I suggest you try googling for answers to these things. This is a site dedicated to the Oracle database, the questions are answered by volunteers (not Oracle employees) and we are primarily geeks rather than marketing droids. If you have a specific Oracle question please feel free to post anytime.
    Thank you for your interest.
    Arrivederci, APC

  • Difference between tRFC and RFC

    Hi Experts,
    Can any one help me in details to differentiate tRFC from RFC in their application perspective.
    And also let me know the role of ALE and BAPI in both the connection log.ie,Where we have to use ALE and BAPI.
    Regards
    Kumar

    Hi,
    RFC = Remote Function Call and TRFC = Transactional Remote Function Call
    Transactional RFC and Queued RFC are variants of the Remote Function Call that make the data transfer between different SAP R/3 systems more reliable and more secure.
    Transactional RFC 
    http://help.sap.com/saphelp_nw04/helpdata/en/8b/ceea3b31aac554e10000000a114084/content.htm
    RFC Help link
    http://help.sap.com/saphelp_nw04/helpdata/en/b0/eae2a889e711d2956500a0c94260a5/frameset.htm
    Refer BAPI & ALE
    what is difference between BAPI and ALE
    Re: ALE & BAPI communication
    Re: bapi-ale interface
    /Srinivas

  • What is the difference between Statement and PreparedStatement

    Hi
    What is the difference between Stement and PrepareStatement Other than PreCompilation and dynamic Parameters?
    Thanks in advance.
    Sekhar

    Most of the differences are either those, or consequences of those (such as better performance, greater security, and simpler use for PreparedStatement). Serious programmers should almost always use PreparedStatement.
    The only other thing I know of is trivial: you can get ResultSetMetaData from a PreparedStatement without actually executing a query.

  • What are the differences between Logos and LogosXT?

    What are the differences between Logos and LogosXT?

     Logos XT is a networking middle-layer maintained by the LabVIEW Network Technologies and Security group. Logos XT provides a thin layer on top of TCP/IP to simplify some common network tasks.
    The underlying foundation for NI networking is called Logos.
    I believe that the basic idea is Logos is what is going on behind the scenes at the base level and Logos XT lets you build your own networking protocols on top of Logos.  Logos XT would be used if you want to make your own networking protocol instead of using TCP/IP or UDP.
    Scott A
    SSP Product Manager
    National Instruments

  • Difference Between Transport and message protocols in XI

    Hi,
        Can u please explain with some example , Difference Between Transport and message protocols in XI.
    thanks
    dhanush

    Hi dhanush,
    This two can have different attributes which were assigned in the adapter metadata. Please see this help for some info on this:
    http://help.sap.com/saphelp_nw04/helpdata/en/79/e462405c910272e10000000a155106/content.htm
    Go to SAP BASIS 6.40 or 7.00 software compoenent and open namespace http://sap.com/xi/XI/System. Go to Adapter objects and open Adapter metadata. Then open any adapter. Here you can see all the properties of your adapter which support.
    Transport protocol gives information about outside of message details, kind of system, security details.
    A transport protocol is a network protocol that has the capability of transferring some payload from one node to another, thus providing some level of transparency from the underlying network.
    Transport protocols are used as a mechanism to move payloads around a network. Typically, a payload will have a transport binding associated with it. For example, SOAP (acting as a payload) has a predetermined binding for HTTP (a transport protocol).
    Some common transport protocols include: HTTP, HTTP-R, SMTP and BEEP.
    Message protocol gives you an idea of message type XI payload
    http://help.sap.com/saphelp_nw04/helpdata/en/b6/0b733cb7d61952e10000000a11405a/content.htm
    Regards
    Biplab
    <b><i>
    note:reward with points if helpful</i></b>

  • Difference between S_PROGRAM and S_DEVELOP!!

    Hi All,
    Can anyone please tell me the difference between S_PROGRAM and S_DEVELOP..??
    I think both are used to protect the access to the ABAP programs..Then how it's different from each other?
    Thanks in advance,
    Ram

    Hello Ramkumar,
    S_PROGRAM authorization object is used as mentioned, to protect execution of the program:
    For example ig you have a program called "ZPROGRAM" and you want to secure the program such that only a select few people can execute it, you need to assign an "authorization group" (dont confuse this with the authorization group value used in S_TABU_DIS).
    To assign the authorization group to the prgram go to transaction SE38 type in the progrm name and click on edit
    (Please note that you need a DEVELOPER key to edit the program)
    Then once you the program is displayed use the menu option:
    GOTO--> attributes
    One of the field displayed here is "authorization group". You have to assign the authotization group here (the field name is SECU) (these authorization group values are stored in table TPGP).
    But as suggested by Julius RSCSAUTH is a better option especially since Security guys wont have access to developer keys.
    Once this is done, the authorization group has to be assigned in the object S_PROGRAM in an authorization role.
    Only if the role containing this object (with the appropriate value) is assigned to the user, he will be able to execute that program.
    S_DEVELOP is used to create / modify / change programs (and their attributes). This authorization is only necessary for ABAP developers / prgrammers and you should avoid assigning this to anyone else.
    Hope this helps.
    Regards,
    Prashant

  • What's differences between jaas and jacc?

    lately i saw a new java scurity released on http://java.sun.com/j2ee/javaacc/; it seems like similar to JAAS (http://java.sun.com/products/jaas/); though, reportedly, jacc concerned more detail in authrization, however, there's autherization api been included as i know. is there anyone be able to tell me what's differences between jaas and jacc? or where there's resource or article exaplained detail about this issue?
    i appreciate any suggestions.
    thank you very much,

    From what I saw, the JACC specifically deals with what is currently called Container Managed Security. JAAS is something that would be used on top of JACC.
    See also:
    http://java.sun.com/j2ee/1.4/docs/tutorial/doc/Security11.html
    JACC contracts provide the following benefits:
    - JACC moves security administration and decision-making responsibility from the container to the security providers.
    - JACC enables the use of a common policy across different security systems.
    - J2EE system integrators can integrate containers with existing authorization policy infrastructure
    re Jaap

  • Can anyone please let me know the differences between EDW and BI 7 if any

    Can anyone please let me know the differences between EDW and BI 7 if any.

    hi,
    As such their is no diff  between the to
    The Enterprise Data Warehouse (EDW) is a service offered by the Data Services Department of the Information Services and Technology Division.  EDW consolidates data from multiple sources in support of campus wide decision making and related information needs such as reporting, analysis, and planning.
    The vision for the EDW is to provide information that is secure, accurate, timely, consistent, integrated, appropriately detailed, well-organized, and easy to obtain so that people throughout the campus -- staff, faculty, researchers, and executive-level administrators -- will be better able to assess their needs, set priorities, understand the impact of change, and fulfill their programmatic responsibilities more efficiently.
    The major components of the existing Enterprise Data Warehouse are:
      BAIRS Financials
    BAIRS HRMS
    BIS
    Legacy BIS
    Student Data Warehouse Pilot 
    AND BI 7 is the latest version of the EDW which is currently in used in full fledged everywhere with lots of added functionality.
    Assign points if helpful.
    Regards,
    Amit

Maybe you are looking for

  • Streaming WMV Help Please

    Hi so I just got a new macbook pro the other day and am having some trouble. My school has streaming lectures I need to access but they are in wmv format. I have downloaded both flip4mac and vlc but neither seem to work. Quicktime will either tell me

  • Can I change my logic serial number?

    I accidentally installed Logic with wrong serial(it was used already). Can I feed new serial without installing? I tried to make fresh install but it does´t ask serial anymore...? Az

  • Pass an hidden parameter to the BI Publisher

    Hi guru, I need to pass a value (parameter) to a BI Publisher report without to show the value to the user. I tried to create an hidden parameter, and tried to pass the value but don't work. I tried to call the report in GET and POST without success.

  • Applet not running outside of netBeans

    I have an applet that was compiled & built within NetBeans 4.1 under jdk1.5.0_04. It runs perfectly inside of NetBeans. It doesn't run outside of NetBeans. I created the HTML launcher file and placed it in the same folder where the applet class file

  • Apply layout to user form

    Hi everybody, Is there a way to link a layout (created from layout designer)  to our Add-on forms? By default the button ‘”Print Layout Designer ...” is deactivated in the main toolbar when we open an add-on form. Thanks a lot for your help Cyril