How to System Copy in SAP Business Intelligence (BI SYSTEM) System Landscapes?

The below post explain how the System Copy in SAP Business Intelligence System Landscapes in detail.

  1. Take the backup f the production system (Source)
  2. Pre-Steps on the target system (The tables/ Data that need to be restored after a system copy)
  3. Clean the database (SAPDATA1, SAPDATA2,…………..)

SQL> Select username from DBA_USER;

SQL> Select table_name from dba_tables where owner = ‘OPS$willsys99\NWADM’;

  1. Restore the database from backup /or physical copy of the datafiles (SAPDATA1, SAPDATA2…………..)
  2. Generate control file (Alter database backup control file to trace)

A trace file is generated in saptrace directory

Rename the file to control.sql (Change the SID and path name of datafiles accordingly)

  1. Remove the entries before “startup nomount” and after “Characteristics WE8DEC’

Run Control file on the target system

  1. Run “Oradbusr.sql” to setup permissions on the database to create OPS$USERS
  2. Up to 4.6c SAPR3 is the owner of the database.
  3. up to ECC5.0 SAP<SID> is the owner of the database.
  4. From Netweaver 04S (WebAS 7.0) on wards SAPSR3 is the owner of the database for ABAP. SAPSR3DB is for the JAVA system.

System Copy (For BI System)


  1. User i.e. work process connects to the database as user “OPS$<Hostname>\SIDADM to get SAPSR3’s password.
  2. SAPSR3 is the schema user whose password stores in table SAPUSER which is owned by OPS$<hostname>\SIDADM

Note: OPS$ mechanism provides a means to connect to the database without any password i.e. user with prefix OPS$. The OS user is created in the database with prefix OPS$(OS Username).

The connection is only possible when …

SQL> select count * from dba_table where owner = ‘SAPSR3’;

SQL> select bname from SAPSR3.USR02;

Remote_OS_Authenticate = True

  1. The Process gets the password and disconnects the session.
  2. Process relogins to the database with user SAPSR3 who owns the complete SAP database.
  3. Now the user can access the complete SAP Schema.
  4. When the user log in with userid/ password/ mandt/ language it goes to the table USR02 (Internal security of SAP) to validate users.

Note: If any of the 1-5 fails then R3Trans -d results (0012) snote : 400241

SAPSR3 password resides in two tables.


SAP recommends to change the schema user password using BRTOOLS/ SAPDBA.

If it is manual we need to change in two tables.

SQL> Insert into table ‘OPS$<hostname>/SIDADM’.SAPUSER values

SQL> Alter user SAPSR3 identified by “New password”

When you insert password it is alphanumeric(It will be in the encrypted format after restart)

Goto > Tcode SECATT

Test [ ] create

Description [ ]

Component [BC]


Also See: What is SAP Router? and How to Configure SAP Router?

Recommended Reading For You

  • Define System LandscapeDefine System LandscapeThe purpose of this activity is to establish the system landscape. The system landscape consists of the SAP Systems and clients that will enable you to adapt the SAP standard software to […]
  • What is Business Intelligence?What is Business Intelligence?Business Intelligence: The Purpose of Business Intelligence, During all business activities, companies create data. In all departments of the company, employees at all levels use this data […]
  • SAP BI Working Capital an OverviewSAP BI Working Capital an OverviewSAP BI Working Capital Cash flows in a cycle into, around and out of a business. It is the business's life blood and every manager's primary task is to help keep it flowing and to use the […]
  • How to Manage Permissions Roles To SAP Users?How to Manage Permissions Roles To SAP Users?Manage Permissions Roles To SAP Users: Managing permissions in SAP NetWeaver BI can restrict user access. These limitations apply to both the possible actions (or launch a state change, […]
  • Transport in SAP BI – Step by Step Procedure to ImplementTransport in SAP BI – Step by Step Procedure to ImplementTransport in SAP BI : SAP in general transports will be implemented by Basis persons or we can automate the transports implementation by scheduling the job. Sometimes we will be in […]
Comments (1)
  1. saki Jun 15, 2016

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: