Start Level 1 Node: Security Guide for SAP BWSecurity Guide for SAP BWEnd Level 1 Node: Security Guide for SAP BW
   Start Level 1 Node: User Management and AuthenticationUser Management and AuthenticationEnd Level 1 Node: User Management and Authentication
      Start Level 2 Node: User ManagementUser ManagementEnd Level 2 Node: User Management
      Start Level 2 Node: Authentication and Single Sign-OnAuthentication and Single Sign-OnEnd Level 2 Node: Authentication and Single Sign-On
   Start Level 1 Node: AuthorizationsAuthorizationsEnd Level 1 Node: Authorizations
      Start Level 2 Node: Authorization Log for Analysis AuthorizationsAuthorization Log for Analysis AuthorizationsEnd Level 2 Node: Authorization Log for Analysis Authorizations
      Start Level 2 Node: Checking Analysis Authorizations as Another UserChecking Analysis Authorizations as Another UserEnd Level 2 Node: Checking Analysis Authorizations as Another User
      Start Level 2 Node: Using ABAP Routines in the Analysis Process DesignerUsing ABAP Routines in the Analysis Process DesignerEnd Level 2 Node: Using ABAP Routines in the Analysis Process Designer
   Start Level 1 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 1 Node: Network and Communication Security
      Start Level 2 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 2 Node: Communication Channel Security
      Start Level 2 Node: Communication DestinationsCommunication DestinationsEnd Level 2 Node: Communication Destinations
      Start Level 2 Node: Network SecurityNetwork SecurityEnd Level 2 Node: Network Security
      Start Level 2 Node: Web Services und ICF Services in BWWeb Services und ICF Services in BWEnd Level 2 Node: Web Services und ICF Services in BW
   Start Level 1 Node: Security for Data StorageSecurity for Data StorageEnd Level 1 Node: Security for Data Storage
   Start Level 1 Node: Security-Related Logging and TracingSecurity-Related Logging and TracingEnd Level 1 Node: Security-Related Logging and Tracing
   Start Level 1 Node: Further Security-Relevant InformationFurther Security-Relevant InformationEnd Level 1 Node: Further Security-Relevant Information
   Start Level 1 Node: Security-Related Information for BI JavaSecurity-Related Information for BI JavaEnd Level 1 Node: Security-Related Information for BI Java
      Start Level 2 Node: User Management and AuthenticationUser Management and AuthenticationEnd Level 2 Node: User Management and Authentication
         Start Level 3 Node: User ManagementUser ManagementEnd Level 3 Node: User Management
         Start Level 3 Node: Authentication and Single Sign-OnAuthentication and Single Sign-OnEnd Level 3 Node: Authentication and Single Sign-On
            Start Level 4 Node: Calling BEx Web Applications from the PortalCalling BEx Web Applications from the PortalEnd Level 4 Node: Calling BEx Web Applications from the Portal
            Start Level 4 Node: Information Broadcasting as Background ProcessingInformation Broadcasting as Background ProcessingEnd Level 4 Node: Information Broadcasting as Background Processing
            Start Level 4 Node: Information Broadcasting in the WebInformation Broadcasting in the WebEnd Level 4 Node: Information Broadcasting in the Web
            Start Level 4 Node: Publishing to the PortalPublishing to the PortalEnd Level 4 Node: Publishing to the Portal
      Start Level 2 Node: Network and Communication Channel SecurityNetwork and Communication Channel SecurityEnd Level 2 Node: Network and Communication Channel Security
         Start Level 3 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 3 Node: Communication Channel Security
         Start Level 3 Node: Communication DestinationsCommunication DestinationsEnd Level 3 Node: Communication Destinations
      Start Level 2 Node: Security with Data StorageSecurity with Data StorageEnd Level 2 Node: Security with Data Storage
      Start Level 2 Node: Other Security-Relevant InformationOther Security-Relevant InformationEnd Level 2 Node: Other Security-Relevant Information