Hello Security Experts,
Can you please explain the BW Security?
What is the diffrence between R/3 and BW security?
and please let me know the critical Auth.objects in BW?
Thaks
Purna