<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BW Security  Rules in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/bw-security-rules/m-p/2743943#M637760</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;would suggets to follow a SAP BW security course as there is to much to know to describe here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Sep 2007 12:38:32 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2007-09-17T12:38:32Z</dc:date>
    <item>
      <title>BW Security  Rules</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/bw-security-rules/m-p/2743942#M637759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gurus,&lt;/P&gt;&lt;P&gt; Can anyone please let me know how to setup rules for BW Security Rules for a client. We dont have any security rules prescribed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I get any particular site for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have any material please send this to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advancce&lt;/P&gt;&lt;P&gt;Savi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please don't post email addresses in the forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: &lt;/P&gt;&lt;P&gt;        Frank Koehntopp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 12:29:46 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/bw-security-rules/m-p/2743942#M637759</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-09-17T12:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: BW Security  Rules</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/bw-security-rules/m-p/2743943#M637760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;would suggets to follow a SAP BW security course as there is to much to know to describe here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 12:38:32 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/bw-security-rules/m-p/2743943#M637760</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-09-17T12:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: BW Security  Rules</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/bw-security-rules/m-p/2743944#M637761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;THese are rules are specific to client.. I would like to know the rules SOX created by SAP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 12:44:09 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/bw-security-rules/m-p/2743944#M637761</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-09-17T12:44:09Z</dc:date>
    </item>
    <item>
      <title>Re: BW Security  Rules</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/bw-security-rules/m-p/2743945#M637762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what is rules SOX created by SAP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are sox requirements that may need to be incorporated into an implementation - the general IT controls for BW will be the same as for your R/3 box generally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are only using BW for reporting then the end user roles will not fall under the scope of segregation of duties as it is being used for display data purposes only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There may be segregation of duties required in the admin function but you should speak to someone on your project or in your company who knows the relevant info for your implementation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 13:30:46 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/bw-security-rules/m-p/2743945#M637762</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-09-17T13:30:46Z</dc:date>
    </item>
  </channel>
</rss>

