SlideShare a Scribd company logo
Exercise1: Create and Execute BI query
Exercise 2: Set up Info Object-Level Security for Reporting Users
Exercise 3: Using S_RS_COMP1 and S_RS_FOLD
Exercise 4: Tracing BI authorizations
Exercise 5: ST01 Trace
Exercise 6: Securing Access to workbooks
Exercise 7 Using SAP provided templates to build security for administrator users
Exercise 1: Create and Execute BI query
Solution:
Go to ProgramsBusiness ExplorerAnalyzer
Go to BEX toolbarToolsCreate New Query
Select the system and login
Select “New Query”
Select the Info Provider on which query need to be created
Select the Cube and click Open
Drag and drop the characteristics/key figures from left window to right Rows/columns and Free
Characteristics
And then click to save the query. Select the Role
Enter the description and technical name and Click SAVE
Login using Bex Analyzer and then run the Query and Result will be displayed as below
Exercise 2: Set up Info Object-Level Security for Reporting Users
Solution:
The steps to implement authorization level security:
• Make the info object as authorization relevant
• Create analysis authorization on that info object
• Assign analysis authorization to user (directly or through Role)
• Add a variable to the Query
Create a user
Execute SU01 and give the user name and click Create
Enter User First Name and Last Name
Go to Logon Tab and then Enter Initial Password; enter the same password in Repeat Password
Go to Roles Tab and then add Role “REPORTING_BASIC” and Click Save
Note: If REPORTING_BASIC role is not existing in the system then can be uploaded in the below
way to the system. This Role contains access to Basis Transaction codes needed by a reporting
user.
Upload a Role:
• Copy the below role to your desktop
REPORTING_BASIC.
SAP
• Execute Tcode PFCG and then Select RoleUpload
Click Ok
Select the Role and Click OPEN
And then click ok on the message
Go to the change mode of the Role by clicking
Go to authorization tab by clicking change authorization data
Click Save and Then Generate
And role is now uploaded and activated in the system
Define the Info Object as authorization relevant
Execute RSA1, Go to InfoProvider, expand the info are and then double click on your info object
or Execute Tcode RSD1, enter info object name
Go to change mode and then Business Explorer tab, check “authorization Relevant”
Save and activate the info object.
Create Analysis authorization
• Execute Tcode RSECAUTH
• Enter Name of analysis authorization ZCOMP_CODE and Click Create
•
Enter short, medium and long description and click to insert mandatory characterstics
Double click on 0TCAACTVT, then click Value authorization tab and enter the below values and
go back
Double click on 0TCAVALID, then click Value authorization tab and enter the below values and
go back
And then Double click on 0TCAIPROV, then click Value authorization tab and enter the below
values and go back
Enter 0COMP_CODE
And then Double click to specify the values
Note: This value defines the restriction of your info object to some specific values. You can select
any value depending upon the data that is available in your info object
And then click Save.
Assign Authorization to User
Execute Tcode RSU01, enter user name and click Change
Enter analysis auth name and click Insert
And then Click Save
Add a variable to a Query
Go to Query Designer. Open existing query. Drag Company Code to char restriction tab
Right click on Company Code and select Restrict
Select variables from the drop down list.
Click Create
Specify Description for Variable, Technical name and Processing Type in General Tab
Specify the below mentioned details in “Details” tab
Move the variable from left window to Selection list and click OK
Save the Query.
Login using Reporting_## and select the query to execute using Bex Analyzer
It will be prompted for the variable value
Result will be displayed only for company Code 1000 and 1101
Exercise 3: Using S_RS_COMP1 and S_RS_FOLD
Solution:
Create a new role REPORTING_BASIC_NEW by copying the REPORTING_BASIC role
Execute Tcode PFCG and then Enter Role Name
The Role Copy
Enter the new Role name and click copy selectively
Go to Change mode of the Role, authorization tab, click Change authorization data
• Expand the Business Information Warehouse object class and then authorization object
Business Explorer – Components Enhancements to the Owner (Object S_RS_COMP1).
• Choose Change
• Next to the Owner (Person Responsible) give the userid of the query owner
• For e.g. if we give userid of Anil here and assign this role to REPORTING-## user then
REPORTING-## will be only able to view the queries created by Anil.
Click Save and Then Generate and click ok to accept the default profile
Assign the Role to REPORTING-## user
Execute SU01 and click Change
Go to Roles Tab and Delete the existing role and add new one and click Save
• Log on to the Bex Analyzer as REPORTING-## and note which queries the user can
access through Info Area
• User should be able to see the queries created by user Anil
Hide Info Area Push button for reporting users using S_RS_FOLD
Change role REPORTING_BASIC_NEW through PFCG and click Change authorization Data
Click manually to add S_RS_FOLD auth object
Enter object and click Ok
Select the Value, Save and Generate the Role
This will hide the Info Area Push button for the users, so that they are not able to view the Info
Providers
Exercise 4: Tracing BI Authorizations
Solution:
Create any new user with access to Role REPORTING_BASIC_NEW and let user execute
ZTEST_QUERY2. User will get below authorization error:
We need to put a trace on to analyze the error.
Execute RSECADMIN and then go to Analysis Tab. Click on Error Logs
Click “Configure Log Recording”
Add the user name and click “Add User” and Click Save
Login as REORTING_1 and let the user execute the same query until user get “No authorization”
error message:
To Check the Trace
Execute RSECADMIN and then go to Analysis Tab. Click on Error Logs
Click Display
Error log will be something like below:
Trace is checking info object 0COMP_CODE in user’s profile which is missing
Exercise 5: ST01 Trace
Solution:
Login as an admin user and Execute ST01
Make sure Authorization check is selected and there is no General Filters
And click on Trace On
Execute Tcode RSA1 and go to the specific Info Provider under modeling tab
Right click and Select “Create InfoCube”
Enter name, description and copy from and then click “Create”
Select Activate
Execute ST01 and Press “Analysis”
Enter user id and limit the records for authorization check only and click Execute
And you will be able to see the trace log for authorization checks that happened against your
profile
Exercise 6: Securing Access to workbooks
Part 1
Open an existing query and try to save it to Roles Tab using REPORT_1 user id
Since No roles are assigned to your end, you will not able to assign it.
Part 2
Execute Tcode PFCG
Enter Role name REPORTING_WORKBOOK_01 and click Create
Enter description and Save.
Go to authorization tab
Click on Change Authorization data
Click manually to add the authorization objects
Add S_USER_AGR and S_USER_TCD and click Ok
Maintain the values as below
And generate the Role
Go to Menu Tab and created Folder Sales
Enter name as Sales and Click OK
Now assign the Role to User Reporting_1 and click on User comparison and save the role
Part 3
Execute the Query using BEX Analyzer and save the results
Go to Roles Tab Workbook roleSales Folder
Enter the Workbook name and click SAVE
Part 4 Go to PFCG and enter the Role name REPORTING_WORKBOOK_01
Go to Menu Tab and click Report
Add the workbook id
And save the Role
Exercise 7: Use SAP Provided Template to Build Security
Solution:
Execute PFCG and enter name and click Create
Enter Description and Go to Authorization tab, and click change authorization data
Select the role S_RS_RDEAD and Select Adopt reference
You can expand the required Class and then auth object to see the specific values

More Related Content

What's hot

Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
nanda nanda
 
T codes sap-basis-training
T codes sap-basis-trainingT codes sap-basis-training
T codes sap-basis-training
munnasap007
 
SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
Ragu M
 
100 sap basis_interviwe_questions
100 sap basis_interviwe_questions100 sap basis_interviwe_questions
100 sap basis_interviwe_questions
bhaskarbi
 

What's hot (20)

Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
How to analyzing sap critical authorizations
How to analyzing sap critical authorizationsHow to analyzing sap critical authorizations
How to analyzing sap critical authorizations
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
T codes sap-basis-training
T codes sap-basis-trainingT codes sap-basis-training
T codes sap-basis-training
 
Sap security interview question & answers
Sap security interview question & answersSap security interview question & answers
Sap security interview question & answers
 
Sap bw lo extraction
Sap bw lo extractionSap bw lo extraction
Sap bw lo extraction
 
Abap Objects for BW
Abap Objects for BWAbap Objects for BW
Abap Objects for BW
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
 
100 sap basis_interviwe_questions
100 sap basis_interviwe_questions100 sap basis_interviwe_questions
100 sap basis_interviwe_questions
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and Instruction
 
Automate user creation using sap gui scripting
Automate user creation using sap gui scriptingAutomate user creation using sap gui scripting
Automate user creation using sap gui scripting
 
Sap application log
Sap application logSap application log
Sap application log
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
 
BW Migration to HANA Part1 - Preparation in BW System
BW Migration to HANA Part1 - Preparation in BW SystemBW Migration to HANA Part1 - Preparation in BW System
BW Migration to HANA Part1 - Preparation in BW System
 
FS for FICO
FS for FICOFS for FICO
FS for FICO
 
What is sap security
What is sap securityWhat is sap security
What is sap security
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Sap basis made_easy321761331053730
Sap basis made_easy321761331053730Sap basis made_easy321761331053730
Sap basis made_easy321761331053730
 

Viewers also liked

Governance Of Enterprise IT MIA
Governance Of Enterprise IT MIAGovernance Of Enterprise IT MIA
Governance Of Enterprise IT MIA
Troy DuMoulin
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
Siva Pradeep Bolisetti
 
Bearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHELBearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHEL
Siva Pradeep Bolisetti
 
Business Driven Architecture for Strategic Transformation
Business Driven Architecture for Strategic TransformationBusiness Driven Architecture for Strategic Transformation
Business Driven Architecture for Strategic Transformation
David Baker
 
SAP BASED PLANT MAINTENANCE
SAP BASED PLANT MAINTENANCESAP BASED PLANT MAINTENANCE
SAP BASED PLANT MAINTENANCE
PANKAJ TIKEKAR
 

Viewers also liked (20)

Governance Of Enterprise IT MIA
Governance Of Enterprise IT MIAGovernance Of Enterprise IT MIA
Governance Of Enterprise IT MIA
 
How to improve user experience via roles
How to improve user experience via rolesHow to improve user experience via roles
How to improve user experience via roles
 
Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Authorisations in SAP: best practices
Authorisations in SAP: best practicesAuthorisations in SAP: best practices
Authorisations in SAP: best practices
 
Enterprise Risk Management Software
Enterprise Risk Management SoftwareEnterprise Risk Management Software
Enterprise Risk Management Software
 
Sappress sap governance risk and compliance
Sappress sap governance risk and complianceSappress sap governance risk and compliance
Sappress sap governance risk and compliance
 
Use of network scheduling technique
Use of network scheduling technique Use of network scheduling technique
Use of network scheduling technique
 
SAP Plaint Maintenance Training in Hyderabad,USA,UK,Canada,Austarlia
SAP Plaint Maintenance Training in Hyderabad,USA,UK,Canada,AustarliaSAP Plaint Maintenance Training in Hyderabad,USA,UK,Canada,Austarlia
SAP Plaint Maintenance Training in Hyderabad,USA,UK,Canada,Austarlia
 
Master data distribution in SAP: implementation guide
Master data distribution in SAP: implementation guideMaster data distribution in SAP: implementation guide
Master data distribution in SAP: implementation guide
 
Bearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHELBearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHEL
 
Simplifying SAP Plant Maintenance
Simplifying SAP Plant MaintenanceSimplifying SAP Plant Maintenance
Simplifying SAP Plant Maintenance
 
Best Practices for Managing a Global SuccessFactors Rollout
Best Practices for Managing a Global SuccessFactors Rollout Best Practices for Managing a Global SuccessFactors Rollout
Best Practices for Managing a Global SuccessFactors Rollout
 
Business Driven Architecture for Strategic Transformation
Business Driven Architecture for Strategic TransformationBusiness Driven Architecture for Strategic Transformation
Business Driven Architecture for Strategic Transformation
 
Solar refrigeration system
Solar refrigeration system Solar refrigeration system
Solar refrigeration system
 
SAP BASED PLANT MAINTENANCE
SAP BASED PLANT MAINTENANCESAP BASED PLANT MAINTENANCE
SAP BASED PLANT MAINTENANCE
 
ProcessGene GRC Software Suite
ProcessGene GRC Software SuiteProcessGene GRC Software Suite
ProcessGene GRC Software Suite
 
Welding and types
Welding and types Welding and types
Welding and types
 
SAP Plant Maintenance Training Material | www.sapdocs.info
SAP Plant Maintenance Training Material | www.sapdocs.infoSAP Plant Maintenance Training Material | www.sapdocs.info
SAP Plant Maintenance Training Material | www.sapdocs.info
 
Sap plant maintenance
Sap plant maintenanceSap plant maintenance
Sap plant maintenance
 

Similar to Step by step exercise for bw 365

Personalize the forms how to oracle applications release 11.5.10 a technica...
Personalize the forms   how to oracle applications release 11.5.10 a technica...Personalize the forms   how to oracle applications release 11.5.10 a technica...
Personalize the forms how to oracle applications release 11.5.10 a technica...
FITSFSd
 
Apps 11i10 forms_personalization
Apps 11i10 forms_personalizationApps 11i10 forms_personalization
Apps 11i10 forms_personalization
Vinod Reddy
 
Ca1 report
Ca1 reportCa1 report
Ca1 report
aeehhhly
 
Lab StepsSTEP 1 Login Form1. In order to do this lab, we need.docx
Lab StepsSTEP 1 Login Form1. In order to do this lab, we need.docxLab StepsSTEP 1 Login Form1. In order to do this lab, we need.docx
Lab StepsSTEP 1 Login Form1. In order to do this lab, we need.docx
smile790243
 
Apps 11i10 Forms Personalization
Apps 11i10 Forms PersonalizationApps 11i10 Forms Personalization
Apps 11i10 Forms Personalization
Hossam El-Faxe
 
( 5 ) Office 2007 Create A Business Data Catolog
( 5 ) Office 2007   Create A Business Data Catolog( 5 ) Office 2007   Create A Business Data Catolog
( 5 ) Office 2007 Create A Business Data Catolog
LiquidHub
 
Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3
ganblues
 
07 b 01workflowdefinition
07 b 01workflowdefinition07 b 01workflowdefinition
07 b 01workflowdefinition
tflung
 
Centaf Sms Day 2
Centaf Sms Day 2Centaf Sms Day 2
Centaf Sms Day 2
ejcometh
 
1. Create and call a function to � Open a text file for storing the.pdf
1. Create and call a function to � Open a text file for storing the.pdf1. Create and call a function to � Open a text file for storing the.pdf
1. Create and call a function to � Open a text file for storing the.pdf
agaramjareld
 

Similar to Step by step exercise for bw 365 (20)

Personalize the forms how to oracle applications release 11.5.10 a technica...
Personalize the forms   how to oracle applications release 11.5.10 a technica...Personalize the forms   how to oracle applications release 11.5.10 a technica...
Personalize the forms how to oracle applications release 11.5.10 a technica...
 
Oracle 11i forms personalization
Oracle 11i forms personalizationOracle 11i forms personalization
Oracle 11i forms personalization
 
Apps 11i10 forms_personalization
Apps 11i10 forms_personalizationApps 11i10 forms_personalization
Apps 11i10 forms_personalization
 
Lightning Process Builder
Lightning Process BuilderLightning Process Builder
Lightning Process Builder
 
Lightning Process Builder
Lightning Process BuilderLightning Process Builder
Lightning Process Builder
 
Presentation
PresentationPresentation
Presentation
 
PEOPLESOFT PTF
PEOPLESOFT PTFPEOPLESOFT PTF
PEOPLESOFT PTF
 
Ca1 report
Ca1 reportCa1 report
Ca1 report
 
MicroStrategy Basic Reporting.pptx
MicroStrategy Basic Reporting.pptxMicroStrategy Basic Reporting.pptx
MicroStrategy Basic Reporting.pptx
 
Lab StepsSTEP 1 Login Form1. In order to do this lab, we need.docx
Lab StepsSTEP 1 Login Form1. In order to do this lab, we need.docxLab StepsSTEP 1 Login Form1. In order to do this lab, we need.docx
Lab StepsSTEP 1 Login Form1. In order to do this lab, we need.docx
 
Apps 11i10 Forms Personalization
Apps 11i10 Forms PersonalizationApps 11i10 Forms Personalization
Apps 11i10 Forms Personalization
 
Attach
AttachAttach
Attach
 
( 5 ) Office 2007 Create A Business Data Catolog
( 5 ) Office 2007   Create A Business Data Catolog( 5 ) Office 2007   Create A Business Data Catolog
( 5 ) Office 2007 Create A Business Data Catolog
 
Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3Informatica PowerAnalyzer 4.0 3 of 3
Informatica PowerAnalyzer 4.0 3 of 3
 
07 b 01workflowdefinition
07 b 01workflowdefinition07 b 01workflowdefinition
07 b 01workflowdefinition
 
HelpDesk Training Manual
HelpDesk Training ManualHelpDesk Training Manual
HelpDesk Training Manual
 
Centaf Sms Day 2
Centaf Sms Day 2Centaf Sms Day 2
Centaf Sms Day 2
 
Mca 504 dotnet_unit5
Mca 504 dotnet_unit5Mca 504 dotnet_unit5
Mca 504 dotnet_unit5
 
Salesforce Lightning Process Builder IS the next-generation workflow tool
Salesforce Lightning Process Builder IS the next-generation workflow toolSalesforce Lightning Process Builder IS the next-generation workflow tool
Salesforce Lightning Process Builder IS the next-generation workflow tool
 
1. Create and call a function to � Open a text file for storing the.pdf
1. Create and call a function to � Open a text file for storing the.pdf1. Create and call a function to � Open a text file for storing the.pdf
1. Create and call a function to � Open a text file for storing the.pdf
 

Recently uploaded

AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
Alluxio, Inc.
 

Recently uploaded (20)

Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
 

Step by step exercise for bw 365

  • 1. Exercise1: Create and Execute BI query Exercise 2: Set up Info Object-Level Security for Reporting Users Exercise 3: Using S_RS_COMP1 and S_RS_FOLD Exercise 4: Tracing BI authorizations Exercise 5: ST01 Trace Exercise 6: Securing Access to workbooks Exercise 7 Using SAP provided templates to build security for administrator users Exercise 1: Create and Execute BI query Solution: Go to ProgramsBusiness ExplorerAnalyzer Go to BEX toolbarToolsCreate New Query Select the system and login
  • 2. Select “New Query” Select the Info Provider on which query need to be created Select the Cube and click Open
  • 3. Drag and drop the characteristics/key figures from left window to right Rows/columns and Free Characteristics And then click to save the query. Select the Role Enter the description and technical name and Click SAVE Login using Bex Analyzer and then run the Query and Result will be displayed as below
  • 4. Exercise 2: Set up Info Object-Level Security for Reporting Users Solution: The steps to implement authorization level security: • Make the info object as authorization relevant • Create analysis authorization on that info object • Assign analysis authorization to user (directly or through Role) • Add a variable to the Query Create a user Execute SU01 and give the user name and click Create Enter User First Name and Last Name Go to Logon Tab and then Enter Initial Password; enter the same password in Repeat Password
  • 5. Go to Roles Tab and then add Role “REPORTING_BASIC” and Click Save Note: If REPORTING_BASIC role is not existing in the system then can be uploaded in the below way to the system. This Role contains access to Basis Transaction codes needed by a reporting user. Upload a Role: • Copy the below role to your desktop REPORTING_BASIC. SAP • Execute Tcode PFCG and then Select RoleUpload Click Ok
  • 6. Select the Role and Click OPEN And then click ok on the message Go to the change mode of the Role by clicking Go to authorization tab by clicking change authorization data Click Save and Then Generate
  • 7. And role is now uploaded and activated in the system Define the Info Object as authorization relevant Execute RSA1, Go to InfoProvider, expand the info are and then double click on your info object or Execute Tcode RSD1, enter info object name Go to change mode and then Business Explorer tab, check “authorization Relevant”
  • 8. Save and activate the info object. Create Analysis authorization
  • 9. • Execute Tcode RSECAUTH • Enter Name of analysis authorization ZCOMP_CODE and Click Create • Enter short, medium and long description and click to insert mandatory characterstics Double click on 0TCAACTVT, then click Value authorization tab and enter the below values and go back Double click on 0TCAVALID, then click Value authorization tab and enter the below values and go back And then Double click on 0TCAIPROV, then click Value authorization tab and enter the below values and go back
  • 10. Enter 0COMP_CODE And then Double click to specify the values Note: This value defines the restriction of your info object to some specific values. You can select any value depending upon the data that is available in your info object And then click Save. Assign Authorization to User Execute Tcode RSU01, enter user name and click Change Enter analysis auth name and click Insert
  • 11. And then Click Save Add a variable to a Query Go to Query Designer. Open existing query. Drag Company Code to char restriction tab Right click on Company Code and select Restrict Select variables from the drop down list. Click Create Specify Description for Variable, Technical name and Processing Type in General Tab
  • 12. Specify the below mentioned details in “Details” tab Move the variable from left window to Selection list and click OK
  • 13. Save the Query. Login using Reporting_## and select the query to execute using Bex Analyzer It will be prompted for the variable value Result will be displayed only for company Code 1000 and 1101 Exercise 3: Using S_RS_COMP1 and S_RS_FOLD Solution: Create a new role REPORTING_BASIC_NEW by copying the REPORTING_BASIC role Execute Tcode PFCG and then Enter Role Name The Role Copy Enter the new Role name and click copy selectively Go to Change mode of the Role, authorization tab, click Change authorization data
  • 14. • Expand the Business Information Warehouse object class and then authorization object Business Explorer – Components Enhancements to the Owner (Object S_RS_COMP1). • Choose Change • Next to the Owner (Person Responsible) give the userid of the query owner • For e.g. if we give userid of Anil here and assign this role to REPORTING-## user then REPORTING-## will be only able to view the queries created by Anil. Click Save and Then Generate and click ok to accept the default profile Assign the Role to REPORTING-## user
  • 15. Execute SU01 and click Change Go to Roles Tab and Delete the existing role and add new one and click Save • Log on to the Bex Analyzer as REPORTING-## and note which queries the user can access through Info Area • User should be able to see the queries created by user Anil Hide Info Area Push button for reporting users using S_RS_FOLD Change role REPORTING_BASIC_NEW through PFCG and click Change authorization Data
  • 16. Click manually to add S_RS_FOLD auth object Enter object and click Ok Select the Value, Save and Generate the Role This will hide the Info Area Push button for the users, so that they are not able to view the Info Providers
  • 17. Exercise 4: Tracing BI Authorizations Solution: Create any new user with access to Role REPORTING_BASIC_NEW and let user execute ZTEST_QUERY2. User will get below authorization error: We need to put a trace on to analyze the error. Execute RSECADMIN and then go to Analysis Tab. Click on Error Logs Click “Configure Log Recording”
  • 18. Add the user name and click “Add User” and Click Save Login as REORTING_1 and let the user execute the same query until user get “No authorization” error message: To Check the Trace Execute RSECADMIN and then go to Analysis Tab. Click on Error Logs Click Display
  • 19. Error log will be something like below: Trace is checking info object 0COMP_CODE in user’s profile which is missing
  • 20. Exercise 5: ST01 Trace Solution: Login as an admin user and Execute ST01 Make sure Authorization check is selected and there is no General Filters And click on Trace On Execute Tcode RSA1 and go to the specific Info Provider under modeling tab Right click and Select “Create InfoCube”
  • 21. Enter name, description and copy from and then click “Create” Select Activate Execute ST01 and Press “Analysis” Enter user id and limit the records for authorization check only and click Execute And you will be able to see the trace log for authorization checks that happened against your profile Exercise 6: Securing Access to workbooks Part 1 Open an existing query and try to save it to Roles Tab using REPORT_1 user id
  • 22. Since No roles are assigned to your end, you will not able to assign it. Part 2 Execute Tcode PFCG Enter Role name REPORTING_WORKBOOK_01 and click Create Enter description and Save. Go to authorization tab Click on Change Authorization data Click manually to add the authorization objects
  • 23. Add S_USER_AGR and S_USER_TCD and click Ok Maintain the values as below And generate the Role Go to Menu Tab and created Folder Sales
  • 24. Enter name as Sales and Click OK Now assign the Role to User Reporting_1 and click on User comparison and save the role Part 3 Execute the Query using BEX Analyzer and save the results Go to Roles Tab Workbook roleSales Folder Enter the Workbook name and click SAVE
  • 25. Part 4 Go to PFCG and enter the Role name REPORTING_WORKBOOK_01 Go to Menu Tab and click Report Add the workbook id
  • 26. And save the Role Exercise 7: Use SAP Provided Template to Build Security Solution: Execute PFCG and enter name and click Create Enter Description and Go to Authorization tab, and click change authorization data
  • 27. Select the role S_RS_RDEAD and Select Adopt reference You can expand the required Class and then auth object to see the specific values