In a previous blog post, we discussed the use of certificates for authenticating clients and servers in general. Now it's time to see how all this theory works in the real world.In this tutorial, we will see how to call a technical API exposed by an ...
The topic of certificates is a confusing one. This text is the attempt to explain the why and how of certificate-based authentication and the difference between client certificates and server certificates. While Bob and Alice make an appearance in di...
In a previous blog post, we examined how a Content Security Policy (CSP) is like good advice given to kids. The post explained the CSP mechanism in general and outlined the phases of a possible implementation project. In a short remark, the CSP topic...
In a previous blog post, we examined how a Content Security Policy (CSP) is like good advice given to kids. The blog entry explained the CSP mechanism in general and outlined the phases of a possible implementation project.Here, we'll look into the t...
"...and don't talk to strangers" - sounds familiar? It sure does. It’s a parent's advice and it’s given to kids all around the world.But what’s happening here? If you look at it from the security angle, the parent is defining a policy for the kid to ...
Hi Rahul,
looks like a bug. Maybe you can look for notes on the topic. If you don't find anything that seems to fit, just open a ticket.
Thanks and best regards,Marc
Hi,if it explicitly states that you have no authorization, a good starting point is transaction RSECPROT. There you will see why you were refused to write.Of course, you need to make sure the cells you want to enter are also input-enabled. If you cha...
Hi Sanjay,there's a nice program that generates example code for SQLscript-based characteristic relationships, data slices, planning functions.To check it out go to transaction SE38 and execute program RSPLS_SQL_SCRIPT_TOOL.Best regards,Marc
Hi Lars,have you maintained any analysis authorizations on the backend?The effective authorizations of a user in BPC context are calculated as (union of analysis authorizations of the user and environment authorizations) intersected with the DAP mai...