Use Authorization Objects to Provide Flexible BW Security

Use Authorization Objects to Provide Flexible BW Security

Reading time: 22 mins

BW security is different and often more difficult to implement than R/3. The author explains how to secure the data in your BW system, focusing on several key points. He discusses authorization objects, transaction code components, and the relationship between them. Examples show you how to provide your users with a flexible and safe system....

This content is for SAPinsider Monthly Subscription, SAPinsider Annual Subscription, and SAPinsider Premium Annual Subscription members only.
Log In Join Now

More Resources