Objects for which BIA is enabled

Dear Experts,
I need to know in my BW which are the objects for which BIA is enabled, how can I them.

Go to RSDDV and then click on button [BIA Indexes]

Similar Messages

  • Authorisation objects for RV and DR document types

    Dear Consultants
    Could any one tell me that, what are the authorization objects for Document types RV and DR?
    we need to  give the base line date  change authorization for the documents which has been posted through RV and DR document types for  some particular users
    early reply will be highly appreciated
    Regards

    Maintained a role with that Authorization Object F_BKPF_BLA for
    Auth Group (0001). And gave activity Nil. ie do not want to
    allow any activity by that Group. Maintained Organizational
    Level Values for Co Code. Generated a profile. Assigned the
    Profile and Role in the User Master.Try running a trace using ST01 and confirming that F_BKPF_BLA is the
    only object for which the user is passing the authorization check (RC 0). It's possible that other authorization objects are granting access
    That need to be configured in customizing.
    Trx OBA7 or IMG path Financial Accounting / Accounts Receivable and Accounts Payable / Business Transactions / Incoming Invoices/Credit Memos / Carry Out and Check Document Settings / Define Document Types,use table TBRG
    use F_BKPF_BLA. Check if it is possible to have
    the t-codes in question check this object in su24

  • Query to get objects list for which the current user has 'SELECT' privilege

    Hi,
    I want to get tables and views list for which the current user has 'SELECT' privilege excluding sytem tables and views. The privilege information for the current user is scattered in more than one system views. I have following system views
    USER_TAB_PRIVS_RECD - Object grants for which the current user is the grantee
    ROLE_TAB_PRIVS - describes table privileges granted to roles. Information is provided only about roles to which the user has access.
    If the object privilege is granted explicitly like "GRANT ALL ON TABLE_NAME TO "USERNAME" then this privilege entry goes to USER_TAB_PRIVIS_RECD
    If the object privilege is granted by ROLE. Role is created with certain object privileges. this role is assigned to user "GRANT ROLE_NAME TO "USERNAME"", then this entry goes to ROLE_TAB_PRIVS
    From these findings, I have composed below query
    (SELECT DISTINCT TABLE_NAME FROM USER_TAB_PRIVS_RECD) UNION (SELECT DISTINCT TABLE_NAME FROM ROLE_TAB_PRIVS WHERE PRIVILEGE = 'SELECT')
    Have I got user's all prvilege details? should I look some other system views?
    How to exclude system table privileges details?
    (SELECT DISTINCT TABLE_NAME FROM USER_TAB_PRIVS_RECD) UNION (SELECT DISTINCT TABLE_NAME FROM ROLE_TAB_PRIVS WHERE PRIVILEGE = 'SELECT' AND OWNER NOT IN ('SYS','SYSTEM') Is this right?
    What about Public role in Oracle? Should I consider public role here?
    Oracel Version :11g
    I want make this query to work on Oracle 8i or above version
    Thanks

    >
    I want to get tables and views list for which the current user has 'SELECT' privilege excluding sytem tables and views.
    >
    You will need a hierarchical query to do that.
    Try this script for Listing privileges recursively for Oracle users
    http://www.adp-gmbh.ch/ora/misc/recursively_list_privilege.html

  • Is there any command/query/etc, which would allow to understand what database objects (for example tables) are consuming memory and how much of it?

    TimesTen Release 11.2.1.9.6 (64 bit Linux/x86_64)
    Command> dssize;
    PERM_ALLOCATED_SIZE:      51200000
      PERM_IN_USE_SIZE: 45996153
    PERM_IN_USE_HIGH_WATER:   50033464
    TEMP_ALLOCATED_SIZE:      2457600
    TEMP_IN_USE_SIZE:         19680
    TEMP_IN_USE_HIGH_WATER:   26760
    Is there any command/query/etc, which would allow to understand what database objects (for example tables) are consuming memory and how much of it?
    tried to use ttsize function, but it gives some senseless results – for example, for the biggest table, tokens, it produces following output (that this table is 90GB in size – what physically cannot be true):
    Command> call ttsize('tokens',null,null);
    < 90885669274.0000 >
    1 row found.

    Are you able to use the command line version of ttSize instead? This splits out how much space is being used by indexes (in the Temp section of the TT memory segment), which I think is being combined into one, whole figure in the procedure version of ttSize you're using. For example:
    ttSize -tbl ia my_ttdb
    Rows = 4
    Total in-line row bytes = 17524
    Total = 17524
    Command> create index i1 on ia(a);
    ttSize -tbl ia my_ttdb;
    Rows = 4
    Total in-line row bytes = 17524
    Indexes:
    Range index JSPALMER.I1 adds 5618 bytes
      Total index bytes = 5618
    Total = 23142
    Command> call ttsize ('ia',,);
    < 23142.0000000000 >
    1 row found.
    In 11.2.2 we added the procedure ttComputeTabSizes which populates system tables with detailed table size data, and was designed to be an alternative to ttSize. Unfortunately it still doesn't calculate index usage though, and it isn't in 11.2.1.

  • How can I get iTunes 11 to stop showing iTunes Match songs on a computer for which iTunes Match is not enabled?

    How can I get iTunes 11 to stop showing iTunes Match songs on a computer for which iTunes Match is not enabled?

    Found it: PREFERENCES --> STORE --> uncheck "Show iTunes in the Cloud Purchases."

  • [svn] 1433: adding 'console' security constraint to MBeanServerGateway remote object for MBean tests and ds-console , used when running on Websphere with administrative security enabled.

    Revision: 1433
    Author: [email protected]
    Date: 2008-04-28 13:13:12 -0700 (Mon, 28 Apr 2008)
    Log Message:
    adding 'console' security constraint to MBeanServerGateway remote object for MBean tests and ds-console, used when running on Websphere with administrative security enabled. Should call setCredentials("bob","bob1") to use this RO.
    Modified Paths:
    blazeds/branches/3.0.x/qa/apps/qa-regress/WEB-INF/flex/remoting-config.mods.xml
    blazeds/branches/3.0.x/qa/apps/qa-regress/WEB-INF/flex/services-config.mods.xml

    Hi,
    It seems that you were using Hyper-V Remote Management Configuration Utility from the link
    http://code.msdn.microsoft.com/HVRemote, if so, you can refer to the following link.
    Configure Hyper-V Remote Management in seconds
    http://blogs.technet.com/jhoward/archive/2008/11/14/configure-hyper-v-remote-management-in-seconds.aspx
    By the way, if you want to perform the further research about Hyper-V Remote Management Configuration Utility, it is recommend that you to get further
    support in the corresponding community so that you can get the most qualified pool of respondents. Thanks for your understanding.
    For your convenience, I have list the related link as followed.
    Discussions for Hyper-V Remote Management Configuration Utility
    http://code.msdn.microsoft.com/HVRemote/Thread/List.aspx
    Best Regards,
    Vincent Hu

  • How to create authorisation object for save button please help in abap

    how to create authorisation object for save button please help in abap

    Hi
    In general different users will be given different authorizations based on their role in the orgn.
    We create ROLES and assign the Authorization and TCODES for that role, so only that user can have access to those T Codes.
    USe SUIM and SU21 T codes for this.
    Much of the data in an R/3 system has to be protected so that unauthorized users cannot access it. Therefore the appropriate authorization is required before a user can carry out certain actions in the system. When you log on to the R/3 system, the system checks in the user master record to see which transactions you are authorized to use. An authorization check is implemented for every sensitive transaction.
    If you wish to protect a transaction that you have programmed yourself, then you must implement an authorization check.
    This means you have to allocate an authorization object in the definition of the transaction.
    For example:
    program an AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT <authorization object>
    ID <authority field 1> FIELD <field value 1>.
    ID <authority field 2> FIELD <field value 2>.
    ID <authority-field n> FIELD <field value n>.
    The OBJECT parameter specifies the authorization object.
    The ID parameter specifies an authorization field (in the authorization object).
    The FIELD parameter specifies a value for the authorization field.
    The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields.
    http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    Authorization : An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.
    You program the authorization check using the ABAP statement AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT 'S_TRVL_BKS'
    ID 'ACTVT' FIELD '02'
    ID 'CUSTTYPE' FIELD 'B'.
    IF SY-SUBRC <> 0.
    MESSAGE E...
    ENDIF.
    'S_TRVL_BKS' is a auth. object
    ID 'ACTVT' FIELD '02' in place 2 you can put 1,2, 3 for change create or display.
    The AUTHORITY-CHECK checks whether a user has the appropriate authorization to execute a particular activity.
    This Authorization concept is somewhat linked with BASIS people.
    As a developer you may not have access to access to SU21 Transaction where you have to define, authorizations, Objects and for nthat object you assign fields and values. Another Tcode is PFCG where you can assign these authrization objects and TCodes for a  profile and that profile in turn attached to a particular user.
    Take the help of the basis Guy and create and use.
    Regards
    ANJI

  • Audit specific objects for specific users

    audit statement has the option to choose audit by user list
    audit object has the option to choose audited objects
    now i need to audit specific objects, i.e. user A's tables accessed by a specific group of users, let's say ALL users other than A
    Is it a simple way to achieve this goal? (audit A's tables that accessed by all database users other than A)
    Thanks!

    sorry, the link works now. However, there is nothing new in 10G, same as I read from 9i document. See my highlight below in the quoted document text, my requirements is the combination of them ( specific users and specific objects). Thanks anyway.
    <quote
    Table 8-1 Auditing Types and Descriptions
    Type of Auditing (link to discussion)      Meaning/Description
    Statement Auditing      Enables you to audit SQL statements by type of statement, not by the specific schema objects on which they operate. Typically broad, statement auditing audits the use of several types of related actions for each option. For example, AUDIT TABLE tracks several DDL statements regardless of the table on which they are issued. You can also set statement auditing to audit selected users or every user in the database.
    Privilege Auditing
         Enables you to audit the use of powerful system privileges that enable corresponding actions, such as AUDIT CREATE TABLE. Privilege auditing is more focused than statement auditing, which audits only a particular type of action. You can set privilege auditing to audit a selected user or every user in the database.
    Schema Object Auditing
         Enables you to audit specific statements on a particular schema object, such as AUDIT SELECT ON employees. Schema object auditing is very focused, auditing only a single specified type of statement (such as SELECT) on a specified schema object. Schema object auditing always applies to all users of the database.
    Fine-Grained Auditing
         Enables you to audit at the most granular level, data access and actions based on content, using any Boolean measure, such as value > 1,000,000. Enables auditing based on access to or changes in a column.
    /quote>

  • What's the variable gpuAccelerate in stage object for?

    Hi!
    What's the variable gpuAccelerate in stage object for?
    It's per default false.
    I've tried to find an answer to this but I couldn't get one from tech docs.
    It also doesn't seem to change paints (looking at one of my animations in Canary's Inspector) if true.
    Thanks,
    Volker

    Hi Darrel, hi Elaine!
    @Darrel: I'm aware of the hardware (GPU) acceleration options in different browsers/systems. I'm just wondering _what_ the boolean in the script output of Edge actually does.
    @Elaine: But _when_ would it switch on GPU in the animations and _where_ (which browsers/platforms)? There's no documentation I've found so far about it and the var is included in every animation with default 'false'.
    And what are the possible pitfalls?
    After beautifying edge-1.5.0.min.js it seems that it just enables the translateZ trick for (some) Webkit based browsers.
    if (this.gpuAccelerate && f[0].style && (typeof n === "undefined" || n === "" || n === "none")) f[0].style.webkitTransform = "translateZ(0)";
    But Edge does anyways already use 3D transitions in its animations?
    Thanks,
    Volker
    Message was edited by: Volker_E

  • Authorization object for BW access from BOBJ

    Hi gurus,
    I have the following error
    I log in to BOBJ using BW ID (Single Sign On enabled) and execute a WebI report. This return error WIS 10901. This error eliminated once i add SAP_ALL to the user
    Can anyone advice what are object that the user should be granted in the BW side in order to execute the report
    Thank you
    BR

    Hi
    I have created a variable (user exit)  for object 0COMP_CODE which will return the list of company code that the user have authorization to using the following codes for the variable
    CALL FUNCTION 'RSEC_GET_AUTH_FOR_USER'
        EXPORTING
          I_IOBJNM     = '0COMP_CODE'
         I_UNAME   =  'BOBJ1'
        IMPORTING
          E_T_RANGESID = lt_RANGE.
      LOOP AT lt_RANGE into ls_RANGE.
        MOVE ls_RANGE-low to wa_range-low.
        MOVE ls_RANGE-high to wa_range-high.
        wa_range-sign = ls_RANGE-sign.
        wa_range-opt =  ls_RANGE-opt.
        APPEND wa_range TO e_t_range. 
    When I execute the query using analyzer , I have the query result returns without any errors but in BOBJ WebI report Iu2019m getting the following error
    Query 1 - GLConsol - SSO
    u201CA database error occured. The database error text is: Error in MDDataSetBW.GetCellData.  You do not have sufficient authorization. (WIS 10901)u201D
    When I change the list of company code that this user have access to * (all company code using the tcode rsecadmin) this error disappear and Iu2019m able to run the WebI report perfectly with all company code listed
    Please advice what am I missing
    Thanking you in advance

  • How  to create  authorisation object for  report

    hi
    experts..
    hw  can u  create authorisation object for  the  custom report.
    Thanks&  Regards
    Spandana

    Hi,
    In general different users will be given different authorizations based on their role in the orgn.
    We create ROLES and assign the Authorization and TCODES for that role, so only that user can have access to those T Codes.
    USe SUIM and SU21 T codes for this.
    Much of the data in an R/3 system has to be protected so that unauthorized users cannot access it. Therefore the appropriate authorization is required before a user can carry out certain actions in the system. When you log on to the R/3 system, the system checks in the user master record to see which transactions you are authorized to use. An authorization check is implemented for every sensitive transaction.
    If you wish to protect a transaction that you have programmed yourself, then you must implement an authorization check.
    This means you have to allocate an authorization object in the definition of the transaction.
    For example:
    program an AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT <authorization object>
    ID <authority field 1> FIELD <field value 1>.
    ID <authority field 2> FIELD <field value 2>.
    ID <authority-field n> FIELD <field value n>.
    The OBJECT parameter specifies the authorization object.
    The ID parameter specifies an authorization field (in the authorization object).
    The FIELD parameter specifies a value for the authorization field.
    The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields.
    http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    Authorization : An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.
    You program the authorization check using the ABAP statement AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT 'S_TRVL_BKS'
    ID 'ACTVT' FIELD '02'
    ID 'CUSTTYPE' FIELD 'B'.
    IF SY-SUBRC <> 0.
    MESSAGE E...
    ENDIF.
    'S_TRVL_BKS' is a auth. object
    ID 'ACTVT' FIELD '02' in place 2 you can put 1,2, 3 for change create or display.
    The AUTHORITY-CHECK checks whether a user has the appropriate authorization to execute a particular activity.
    This Authorization concept is somewhat linked with BASIS people.
    As a developer you may not have access to access to SU21 Transaction where you have to define, authorizations, Objects and for nthat object you assign fields and values. Another Tcode is PFCG where you can assign these authrization objects and TCodes for a  profile and that profile in turn attached to a particular user.
    Take the help of the basis Guy and create and use.
    Sy-SUBRC values
    4              User has no authorization in the SAP System for
                   such an action. If necessary, change the user
                   master record.
    8              Too many parameters (fields, values). Maximum
                   allowed is 10.
    12             Specified object not maintained in the user
                   master record.
    16             No profile entered in the user master record.
    24             The field names of the check call do not match
                   those of an authorization. Either the
                   authorization or the call is incorrect.
    28             Incorrect structure for user master record.
    32             Incorrect structure for user master record.
    36             Incorrect structure for user master record.
    http://www.sap.ittoolbox.com/groups/technical-functional/sap-basis/please-how-to-create-an-authorization-object-386391 - 78k -
    http://www.sap-abaprogram.blogspot.com/2007/11/what-is-use-of-
    authorization-checks-to.html - 75k -
    www.sapworld.hpg.ig.com.br/download/ab4query.pdf
    with thanks,
    Abaper.

  • Difference between Callable Object for execution and Display

    Hi,
             I am new to Guided Procedures.When i am creating a callable object under an Action ,i find callable object for execution and callable object for display in the dropdown.What is the difference between the two types of callable objects.
    Thanks,
    Bala

    Hi Bala,
    GP comes with a set of registered callable object types that define which applications you can directly expose as callable objects and enable their handling in the context of GP processes.
    So the different COs can handle your specific application requirements or process flow requirements appropriately at runtime.
    You refer those COs in actions. To make the action functional, you attach at least one callable object to it. In addition to the object that is executed when the action is called, you can attach a callable object that is displayed after the execution. The first one is mandatory. You must attach a callable object for execution. It can be either a callable object with a visible part, such as a Web Dynpro or BSP callable object, or one for background execution.
    Optionally, you can attach a callable object for display. It is required to have a visible part – for example, you cannot select a callable object for background execution.
    At runtime, this object is displayed if the processor wants to open the process step after it has been completed, or if a process contributor has view permissions on the action.
    To make it easier, I will give you an example with submitting and approving a composite form. Say, the employee fills in an order for something, submits it and the manager then approves or rejects it.
    First, in order for the employee to view the form, you can use a Form Display callable object as a display callable object for actions where the execution object is a form. It displays the name and description of the form and provides a link for download. If the user has view permissions on the step, he or she can view the display object and download the form itself. So, this CO is connected basically with the user experience and what he/she sees displayed on the screen, no matter what happens in the background (e.g. you can have a pre-filling service in the background that prefills some fields of the form, but what the user sees is only the form fields with certain info already prefilled in them).
    Next, for the manager to approve or reject the form of the employee, you need a CO that is only for execution, for example a Process Control CO for File Approval For forms, you can use it in a process in which a form is sent by e-mail. As soon as the form is submitted back to the system, the receiver can view it, save a copy of the form, and depending on his or her decision, can approve or reject it.
    This really is a very simplified example, but I hope it helped a little in some way or another
    Here is a link to the Callable Objects in GP documenatation, hope it also clears up some questions:
    http://help.sap.com/saphelp_nw70/helpdata/en/d2/d174413aff5458e10000000a1550b0/frameset.htm
    Also, a link to the documentation for exposing COs:
    http://help.sap.com/saphelp_nw70/helpdata/en/08/d88041a17e060de10000000a1550b0/frameset.htm
    HTH:)
    Greets,
    Petra

  • How to get the connected Adapter Object for a particular BDoc Type?

    Hi All,
    I have a scenario in which CRM system is connected to ERP system.
    In SMW01 transaction, I can see one BDoc with BUS_TRANS_MSG as the BDoc Type in CRM.
    Now, how do I get to know if this one BDoc is a SALESDOCUMENT or SALESCONTRACT.
    Is there any way thorough which I can get to know the Adapter Object for this particular BDoc.
    Regards,
    Madhuri

    Hi Madhuri,
               Happy new year.
    In Transaction : R3AC1.
    You can observe the Linked BDOC for the adaptor objects. For example Sales docuemnt and Sales contrcat will have the same linked BDOC as "BUS_TRANS_MSG".
    If you see an error in SMW01, you want to find whether it is salesdocument or contract.
    1. Please take the Queue name from SMW01.
    from the queue name you can find whether it is sales contract or sales document.
    Queue name is customized in tables: SMOFQFIND.
    I hope this helps you.
    regards,
    Sri...

  • Have an airplay enabled AV Receiver - how do i set up Airplay    I have a Yamaha RX-V673 which is Airplay enabled, but i can't get Airplay to work either on my Mac book or my iphone. The receiver is connected to my network and i can control it using the

    have an airplay enabled AV Receiver - how do i set up Airplay
    I have a Yamaha RX-V673 which is Airplay enabled, but i can't get Airplay to work either on my Mac book or my iphone. The receiver is connected to my network and i can control it using the iphone App and via the web browser option.
    Do I need Apple TV or to change some settings somewhere?
    Any help would be greatly appreciated

    You are making some progress with setup of wireless network. Apparently there is reliability problem with the wireless connection. Perhaps you want to refer to following Apple support documents and start tweaking parameters in the router to improve the reliability. I used to have third-party routers such as Belkin and Netgear but switched to Apple Airport routers (Time Capsule then Airport Extreme for now) because of incompatibility issues whenever Apple upgrade Mac OS X. But since Apple develops Airplay protocol as alternative to Bluetooth for wireless audio/video streaming (with much better bandwidth) and must be deployed in any wireless network, there is no reason third-party routers not working for Airplay protocol.
    About AirPlay Mirroring in OS X Mountain Lion:
    http://support.apple.com/kb/HT5404
    iOS: Recommended settings for Wi-Fi routers and access points:
    http://support.apple.com/kb/HT4199
    Troubleshooting AirPlay and AirPlay Mirroring:
    http://support.apple.com/kb/TS4215
    Good luck in setting up 802.11 wirelesss network.

  • How to activate all inactive objects for current user

    Hi
    How to activate all inactive objects for current user ...
    ... I have found a (long winded) way to do this:
    - Environment / Inactive Objects
    - Add to Worklist
    - Display Worklist
    - Select All
    - Activate
    this will open a dialog titled "Inactive Objects for <username>"
    which has the exact functionality I need ... but I can't figure out how to get to this dialog directly - without so many intermediate steps
    the SAP docs repeatedly mention the ability to activate the inactive worklist - but do not mention how
    does anybody know the TCode for this dialog?
    thanks
    ps does the term "mass activation" apply to importing change requests rather than development activation?
    Edited by: FireBean500 on Jun 4, 2010 11:07 PM

    No other way. But usually it's far more simple as all objects are already in our own worklist.
    I wonder why your objects are not already in your worklist, as everytime you create or maintain an object, it is added to your worklist.

Maybe you are looking for

  • Sending IDOCs from SAP R/3 to XI

    I have ALE set up to send an IDOC on every Material master change or create. This works fine so far - only after creation I do not receive the IDOC on my XI system's IDOC Adapter. In the Transactional RFCs (sm58) I can see the following error message

  • My iphone is not recognized in itunes for windows

    I have followed the directions from apple support.  Uninstalled & reinstalled itunes, everything the page said to do & my phone isn't recognized in iTunes and it comes up as unkown device in windows.  Any suggestions?

  • Empty folders in my trash that I can't get rid of...

    Hi, I know that there are and have been many posts in this discussion forum about undeletable items in Trash, but rest assured that I have tried everything I could come up with in the last few days and that I have no choice but to post this. First, t

  • Flex column chart in actionscript

    The following code is based on a routine that up until recently was working. I modified it so that it would be easier to fit into a forum post. I need to do this in actionscript because the charts are created on the fly. The following code simply giv

  • Ipad4 front camera just stopped working

    My Ipad 4 camera has just stopped working; the rear camera works fine but when you toggle across the whole thing locks? three weeks out of warranty; feels like an Apple 'frig' to me!