Chapter 6. Managing User Authorization

Security is an essential element of any information system. BW is no exception to this rule. It uses an R/3 utility called Profile Generator to manage authorization. In this chapter, we will demonstrate how to use this utility.

The foundation of SAP authorization management is based on authorization objects. These objects define what a user can do, and to which SAP objects. Such a definition is called authorization. For example, the authorization in Table 6.1 allows users with that authorization to display and execute—but not change—the queries IC_DEMOBC_Q01 and IC_DEMOBC_Q02. This authorization is defined using authorization object S_RS_COMP.

Table 6.1. AN AUTHORIZATION FROM AUTHORIZATION OBJECT S_RS_COMP ...

Get SAP® BW: A Step-by-Step Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.