I need your expertise in the initial steps for extracting data from ECC to BW, and i will appreciate the simplest words you can explain in.
What i am looking for basically is,
- Work Around area in ECC & BW (T-Codes)
- How much of user log in dependency in ECC.
- Basic simple explanation on RSA6,RSA5,RSA2.
In General, how things work out between ECC and BW.
Myself, i am having 5+ years experience in BO with SAP and Non-SAP applications. I am familiar with the process & terminology.
This is the first time i’am solely handling BW area,with ECC as source system that why too much confused
Thanks in Advance!
umarnayab (BOB member since 2013-06-05)