Entering navigation tree
Entering Level 1 Node Security Guide for SAP NetWeaver BISecurity Guide for SAP NetWeaver BILeaving Level 1 Node Security Guide for SAP NetWeaver BI
   Entering Level 2 Node User Administration and AuthenticationUser Administration and AuthenticationLeaving Level 2 Node User Administration and Authentication
      Entering Level 3 Node User ManagementUser ManagementLeaving Level 3 Node User Management
      Entering Level 3 Node Authentication and Single Sign-OnAuthentication and Single Sign-OnLeaving Level 3 Node Authentication and Single Sign-On
         Entering Level 4 Node Authentication: Enterprise Reporting, Query, and AnalysisAuthentication: Enterprise Reporting, Query, and AnalysisLeaving Level 4 Node Authentication: Enterprise Reporting, Query, and Analysis
            Entering Level 5 Node Calling BEx Web Applications from the Enterprise PortalCalling BEx Web Applications from the Enterprise PortalLeaving Level 5 Node Calling BEx Web Applications from the Enterprise Portal
            Entering Level 5 Node Information Broadcasting as Background ProcessingInformation Broadcasting as Background ProcessingLeaving Level 5 Node Information Broadcasting as Background Processing
            Entering Level 5 Node Information Broadcasting in the WebInformation Broadcasting in the WebLeaving Level 5 Node Information Broadcasting in the Web
            Entering Level 5 Node Publishing to the Enterprise PortalPublishing to the Enterprise PortalLeaving Level 5 Node Publishing to the Enterprise Portal
   Entering Level 2 Node AuthorizationsAuthorizationsLeaving Level 2 Node Authorizations
      Entering Level 3 Node Authorization Log for Analysis AuthorizationsAuthorization Log for Analysis AuthorizationsLeaving Level 3 Node Authorization Log for Analysis Authorizations
      Entering Level 3 Node Checking Analysis Authorizations as Another UserChecking Analysis Authorizations as Another UserLeaving Level 3 Node Checking Analysis Authorizations as Another User
   Entering Level 2 Node Communication SecurityCommunication SecurityLeaving Level 2 Node Communication Security
      Entering Level 3 Node Communication Channel SecurityCommunication Channel SecurityLeaving Level 3 Node Communication Channel Security
      Entering Level 3 Node Communication DestinationsCommunication DestinationsLeaving Level 3 Node Communication Destinations
   Entering Level 2 Node Security with Data StorageSecurity with Data StorageLeaving Level 2 Node Security with Data Storage
   Entering Level 2 Node Minimal InstallationMinimal InstallationLeaving Level 2 Node Minimal Installation
   Entering Level 2 Node More Information Relevant to SecurityMore Information Relevant to SecurityLeaving Level 2 Node More Information Relevant to Security