New to BW security

Hi Guys,
       I am completely new to BW security.Can someone please help me with good documentation about how the  roles are built and maintained?
Kindly please do not give any help.sap.com or SDN links.I have already seen those but i am not able to understand the exact procedure.
Any help would be appreciated. Please send the documents if any to my email ID [email protected]
Thanks In advance.

Hi Guptha,
Unlike R/3 Security, BW Security is not Transaction based, it actually deals with securing BW Objects like Info Objects, Info Cube, ODS, Info Source, etc....
The main Authorization Objects in BW are:
S_RS_ADMWB
Authorizations for working with individual objects of the Administrator Workbench. In detail, these are: source system, InfoObject, monitor, application component, InfoArea, Administrator Workbench, settings, metadata, InfoPackage, InfoPackage group, Reporting Agent settings, Reporting Agent package, documents (for metadata, master data, hierarchies, transaction data), document store administration, InfoSpoke.
S_RS_IOBJ
Authorizations for working with individual InfoObjects and their sub-objects
Until Release 3.0A, only general authorization protection was possible with authorization object S_RS_ADMWB. General authorization protection for InfoObjects still works as in the past. Special protection with S_RS_IOBJ is only used if there is no authorization for S_RS_ADMWB-IOBJ.
S_RS_ISOUR
Authorizations for working with InfoSources with flexible updating and their sub-objects
S_RS_ISRCM
Authorizations for working with InfoSources with direct updating and their sub-objects
S_RS_ICUBE
Authorizations for working with InfoCubes and their sub-objects
S_RS_MPRO
Authorizations for working with MultiProviders and their sub-objects Until BW 3.0B, Support Package 1, authorizations for MultiProviders were checked by using the authorization object S_RS_ICUBE. As of BW 3.0B, Support Package 2, this can be maintained, or you can change the check over to the authorization object S_RS_MPRO. To do this, choose in Customizing under Business Information Warehouse ® General BW Settings ® Settings for Authorizations.
S_RS_ODSO
Authorizations for working with ODS objects and their sub-objects.
S_RS_ISET
Authorizations for working with InfoSets
S_RS_HIER
Authorizations for working with hierarchies
S_RS_COMP
New Authorizations Check for Variables in Query Definition
Object type is ‘VAR’
S_RS_COMP1
Is checked additionally with S_RS_COMP
Checks for authorizations on query components dependent on the owner (creator RSZOWNER)
Authorizations are necessary, e.g. for creating queries
S_RS_FOLD
Suppress InfoAreaview of BExelements
Specify ‚X‘ (true) in the authorization maintenance for suppressing
To get more information on BW Security, plz visit:
http://www.*********************/bw_security/bw_security.htm
Hope it helps.
Please award points if it is useful.
Thanks & Regards, Santosh

Similar Messages

  • HT204088 Dear sirs,  Could you please help me on my problem with my apple ID  I create new account with security questions, and when I try to purchase paid application,it ask me for answers the questions but it's not working,  My account have 50$ and stil

    Dear sirs,
    Could you please help me on my problem with my apple ID
    I create new account with security questions, and when I try to purchase paid application,it ask me for answers the questions but it's not working,
    My account have 50$ and still didn't buy anything

    You need to ask Apple to reset your security questions; ways of contacting them include clicking here and picking a method for your country, phoning AppleCare and asking for the Account Security team, and filling out and submitting this form.
    (100546)

  • New to Weblogic Security

    I have an ORACLE database which contains a table of 100s of users and passwords with their group information. I developed a Webapplication (in Tomcat) in which one of the servlets works as authenticator for the user logging in by fetching row from the datbase and validating him.(This is a simple authentication)
    Now I have switched to Weblogic platform 8.1 SP2 and am completely new to Weblogic Security. I want to use Weblogic security features for my application and the users & groups should be retrieved from the database for authentication.
    How can I do this ? Any clear-cut steps ?
    Where can I find them in documentation ?
    Please help me...Urgent !!

    I found it in
    Weblogic Administration Console Home -> Summary of  Security Realms->myrealm->Providers.
    Click on new Authentication provider button-> you will see 'TrustServiceIdentityAsserter' as one of the types.

  • New to web security

    Hi all, I'm new to web security, please clarify me 2 doubts:
    1. How to hide "view page source" option and other default options present in browsers.
    2. How to start with studying SSL? any recommended books n sites?
    thanks in advance.

    Good question. I am having the same problem with my LDAP realm. Funny thing is that the exact same approach worked fine and dandy with Sun AS 8. Sounds to me like something broke under AS 9 ...

  • HT4623 its my first time to purchase using my new iphone, why security verification is needed?

    its my first time to purchase using my new iphone, why security verification is needed?

    To make sure you are the authorized user of your purchase method.

  • Is the new Kaspersky Internet Security recommended with MountainLion 10.8.4?

    Kaspersky Antivirus worked fine with Lion but totally messed up MountainLion. Are there any experiences with the new Kaspersky Internet Security for Mac an MacOS 10.8.4? MacOS 10.8 is explicitly mentioned as system requirements.

    No. There are no Apple recommended anti-malware software.
    Install all System, Applications and Security updates released by Apple.
    For more on this:
    http://support.apple.com/kb/PH11432
    http://www.reedcorner.net/mmg
    Best.

  • Can someone explain what the new feature "Webform Security" is for?

    I notice there is a new field called "Webform Security" which inserts { module_ccsecurity ] into the form code but I have no idea what this is for and there is no reference to this module in the knowledgebase.
    Can anyone offer some details?

    Log into your bank, stay logged in and open a new tab. Then visit another site on the internet.
    Now lets pretend that on this other site, someone (like the site administrator or a commentor) included a link that pointed to a url such as http://www.YourBank.com/TransferMoney?FromAccount=12345&ToAccount=54321&Amount=1000 and then you clicked the link, the bank would think you were making a legitimate transfer request becuase you were still logged in.
    Fair enough, but you probably wouldn't click that link because you're smarter than that.  Unfortunately your browser isn't so smart, and it doesn't have to be a link.   They could have included an image tag, or css style sheet or javascript file that pointed to that url and your browser would have automatically "clicked" the link on your behalf when it tried to download the resource.
    Thats CSRF in a nutshell.
    There are ways to mitigate this danger, but its up to site owner (the bank in this example) to make sure this can't happen. As an end user it's mostly out of your hands. This tag appears to be BC's way to mitigate this, and it appears to be similar to other soultions to this problem.
    I don't know if it works though, it's not docummented, so your guess is as good as mine.  Either way its probably a good idea to include it on your forms.

  • New MacMini and security lock

    Looking at the new MacMini, I was pretty excited to see that it now has HDMI. However, I can not see any hole for a security lock. Did Apple forget that or is it hidden somewhere ? I am looking to buy this for usage in a public room and with that size, a security lock is quite imperative.
    Thank you if you can answer this.

    When I prepared to upgrade the RAM in my new Mini, the first thought that came to mind was "where's the Kensington security slot?" I proceeded to search every square inch of the computer for some kind of security measure and was stunned when I found nothing.
    This, in combination with the increased starting price, is definitely not helpful with encouraging more Macs in kiosk situations. That said, less than $75 to secure the computer (presuming that's what the security device ends up selling for) isn't enough to be a deal breaker.
    Despite the likeliness of a third-party solution, Apple should not have left off this important security feature. Even though the slot would not protect against RAM removal, it is still essential to preventing the loss of property.

  • Is it better to set the admin account to other than myself on a new computer for security purposes?

    Hi all
    On a new computer is it better to set the admin account to other than myself for security purposes? I am sure that I read some years ago that this was the best route to go down. What I am suggesting is that I will still administer the account but not as myself the user in my own name and also will it have any ramifications further down the line.
    Will be using a new Macbook Pro running Lion (when it arrives)
    With thanks in advance for any help and advice on this issue
    Best regards
    Dingoh

    when you get a new mac and set up an account, that account is designated as the admin account automatically.  Creating a second user account without admin privileges is fine to do, if you are afraid that you might accidentally do something harmful that requires admin access.  Make sure it is a second user account and not a guest account, as with a guest account, everything during a session under a guest account gets deleted after the session ends.

  • HT1918 Why wont iTunes accept my new credit card security code?

    My old credit card expired, so I got a new one and iTunes wont except the 3 digit Security Code for my new card! ***?

    i am having the same problem since i upgraded to the o6 on my ipad

  • Collab IDK Store a new Discussion message security settings

    I am working on an ASP.NET 2.0 application that creates a new discussion message. When I login as administrator I am able to store the message. I receive the following error as a user configured with admin access to the project workspace discussion:
    (remote) storeDiscussionMessage: Undeclared Exception Type
    com.plumtree.remote.rat.XPUndeclaredBackEndException: Failed<br>Not allowed post messages
    The application is developed using App Accelerator. The Remote Session is created by using this.m_portletContext.GetRemotePortalSession() in an ALIPortlet Page.
    Any info regarding the required user security settings for creating a message through the IDK is greatly appreciated.

    I can't belive how fast the hosts are. By the time my above reply was posted you were already in the MacBook Pro Forum. Hopefully you'll get the solution to your problem now.

  • Impact of generating a new key for Secure Store Application

    I inherited my development environment from a predecessor, who did not document the secure store pass phrase anywhere. There are a couple of projects doing development on the system that cannot be impacted, but I need to get Project Server running on the
    system, and I cannot get the secure store to accept the credentials I set for the target application. I have recreated the target application several times, but nothing works.
    MossHostSsoHost.GetSecureStoreCredentials: Failed to get credentials from Secure Store. SecureStoreProvider threw a SecureStoreException. Exception: Microsoft.Office.SecureStoreService.Server.SecureStoreServiceException: Access is denied to the Secure Store
    Service.     at Microsoft.Office.SecureStoreService.Server.SecureStoreServiceApplicationProxy.Execute[T](String operationName, Boolean validateCanary, ExecuteDelegate`1 operation)     at Microsoft.Office.SecureStoreService.Server.SecureStoreServiceApplicationProxy.GetCredentials(Guid
    rawPartitionId, String applicationId)     at Microsoft.Office.SecureStoreService.Server.SecureStoreProvider.GetCredentials(String appId)     at Microsoft.Office.Excel.Server.MossHost.MossHostSsoHost.GetSecureStoreCredentials(String
    secureStoreApplicationId)
    So, I am wondering if I need to generate a new key for the secure store application, and what impact that would have on the existing target applications. Can someone please tell me if I generate a new key, will this break the existing applications? Thanks.

    Hi Susan,
    Once you decide to generate a new encryption key, you could follow the steps in Generate an encryption Key part in the link below:
    http://technet.microsoft.com/en-us/library/ee806866(v=office.15).aspx
    You should back up the database of the Secure Store Service application before generating a new key. Then refresh the encryption key to propagate the key to all the application servers in the farm.
    Regards,
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact
    [email protected] .
    Rebecca Tu
    TechNet Community Support

  • Create a new target application - Secure Store Service administration issues

    Hi,
    I am trying to create new target application, when I go to Secure Store Service in Centra admin I have:
    Cannot complete this action as the Secure Store Shared Service is not responding. Please contact your administrator.
    I have used this few days ago and avarything else is working fine on the server, and I have applications created with it running fine.
    Any help is appreciated.
    cheers
    Valko

    I know this has been open and possibly answered for a while but I thought I would mention what I ran into since I haven't found it posted anywhere.
    It was confusing because once I clicked the Ssecure Store Service I recieved the message that is mentioned here in this thread. With that, you can't make any changes. After trying numerous things I simply highlighted the Secure Store Service (the Applicaiont
    not the Application Proxy) and selected Properties from the Operations section of the ribbon at the top of the page. This opened the properties page where I was able to change the Application Pool that the service was using.
    In my case it was using the Sharepoint Web Services Default and changing it to the SecurityTokenServiceApplicationPool, which I had already configured to run on a named account with adequate priveleges (although it should run find on Local or Network
    Service if they are configured correctly in IIS) corrected the issue.
    Hope this helps someone...
    Cheers

  • Got new debit card security pin doesn't work

    My new card has different security code to my old one how do I change settings

    Change Payment Information
    Settings>iTunes and App Stores>Apple ID>View Apple ID>Sign-in>Payment Information

  • How to Configure Thunderbird for new Gmail Enhanced Security?

    On July 15, 2014 Google hardened Gmail security. Once this option is enabled in one's Gmail account, like mine, Thunderbird can no longer connect unless the feature is disabled at the price of weakened security.
    Is there any workaround to allow Thunderbird to synch with Gmail?
    Many websites are stating that email clients like Thunderbird will no longer work with Gmail because of the enhancement.

    Two stepverification:
    If you are using a computer and a phone to access emails then you need to set up the 2 step verification. You need to create an application specific password for Thunderbird that you use instead of the normal password.
    If you are only using gmail via your computer then it is not required.
    Info:
    * http://kb.mozillazine.org/Gmail
    section: Two step verification
    ''The Google Account help advocates using two step authentication. That sends a code (a minimum of once a month but ideally every time you log in) to your cell phone that you need to enter when logging in using a browser. However applications such as email clients can't do that. If you configure two step verification you need to create an application specific password for Thunderbird that you use instead of the normal password. The application specific password doesn't change when a new code is sent to your cell phone.''
    ''Two step verification is not needed, and not recommended. Use a strong password, and don't use the same password with other email providers/web sites, instead. However, if you have another email account it is a good idea to set a recovery email address in case you ever forget/lose your password. ''
    More info on setting up 2 step verification:
    * https://support.google.com/mail/answer/1173270?hl=en

Maybe you are looking for

  • What happened to character kerning in Pages 5.0? Is there a way to do it, or will it come back?

    In the previous version of Pages, you could clean up the presentation of text by adjusting the character kerning of individual paragraphs. If you had a paragraph that ending with a single word, by adjust the kerning, up or down by 1 or 2 percent, tha

  • How to update AFVG in IWO10016?

    Hi, I have found this User-exit (IWO10016) to validate a user field of an operation. It works well for my need: it's called when we enter a value in a user field and hit enter (ex.: AFVGD-USR01) . Now, after my validation of USR01, I want to automati

  • Primary index

    Hi, I have created one table(internal table) in se11 and also have assigned some fields are as primary keys.I know that when we define primary key for one field the system will create primary index for that as ' 0 '.now my question is how to see and

  • Blank first page

    When I import an existing PDF (from a set of customer supplied PDFs) into the Designer I consistently get a blank first page that I am unable to get rid of. In the hierarchy view there is only one page showing. If I click on that page I go to the pag

  • Import of mappings in a test scheme

    hi, I have a problem importing mappings with owb 10 release 1 and I did not find an answer by now: I developed all mappings in a scheme and know I want to test the hole DWH application on a test scheme (on the same server). is it correct that the imp