4
8/12/2019 The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki http://slidepdf.com/reader/full/the-authorization-log-in-rsecadmin-sap-netweaver-business-warehouse-scn 1/4

The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki

Embed Size (px)

Citation preview

Page 1: The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki

8/12/2019 The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki

http://slidepdf.com/reader/full/the-authorization-log-in-rsecadmin-sap-netweaver-business-warehouse-scn 1/4

Page 2: The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki

8/12/2019 The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki

http://slidepdf.com/reader/full/the-authorization-log-in-rsecadmin-sap-netweaver-business-warehouse-scn 2/4

Page 3: The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki

8/12/2019 The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki

http://slidepdf.com/reader/full/the-authorization-log-in-rsecadmin-sap-netweaver-business-warehouse-scn 3/4

Th th i ti L i RSECADMIN SAP N tW B i W h SCN Wiki htt // iki / iki/di l /BI/Th + th i ti +L +i +RSECADMIN

Page 4: The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki

8/12/2019 The Authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki

http://slidepdf.com/reader/full/the-authorization-log-in-rsecadmin-sap-netweaver-business-warehouse-scn 4/4

 After the line "The Following Value Authorizations Were Found", there is a tabular list of all authorizations for single values and intervals of the user. The so called flat authorizations: The entries are sorted

by authorizations (TCTAUTH) and characteristics (TCTIOBJNM). The fields TCTLOW and TCTHIGH specify the lower and upper interval limit.

Under the heading "The Following Hierarchy Authorizations Were Found", there is a list of the hierarchy authorizations of the user.

The fields TCTAUTH and TCTIOBJNM again specify the authorization and characteristic names. The fields HIESID and HIEID have no significance in this context. The fields TCTHIENM und

TCTHIEVERS and TCTHIEDATE are three specifications that generally and precisely define each hierarchy of a characteristic in a BI system: Hierarchy name, version and date (valid-to).

The fields TCTNIOBJNM and TCTNODE precisely define the authorized node. TCTNODE is simply the technical node name.

TCTNIOBJNM specifies the node type.

if TCTNIOBJNM = 0HIER_NODE, then a text node with the name <TCTNODE> is authorized.a.

If TCTNIOBJNM is blank, a hierarchy leaf with the given name is authorized.b.

If TCTNIOBJNM has the same name as the hierarchy-defining characteristic, a chargeable node is authorized.c.

1.

CAUTION The node type is relevant for the authorization. For example: A hierarchy authorization for a text node cannot directly authorize a chargeable node with the same name.

Most of the following l ines are self-explanatory.

The next block is: "Optimization of Authorizations:" (in italics and highlighted in light orange)

Here, the formatting of the authorizations is logged. This is difficult from a logical point of view and therefore explained in detail in Note 1000004.

Related Content

Related Documents

Insert SAP Help links or other WIKI content

Related Notes

Insert links to any related notes/KBA that support your topic or are related

No labels

  Follow SCN

Contact Us   SAP Help Portal

Privacy   Terms of Use   Legal Disclosure   Copyright

The authorization Log in RSECADMIN - SAP NetWeaver Business Warehouse - SCN Wiki http://wiki.scn.sap.com/wiki/display/BI/The+authorization+Log+in+RSECADMIN

4 of 4 13/07/2014 22:45