Q5) What is the procedure you follow in your company as a security admin when a end user complains that he is unable to perform or execute an action in a particular tcode?
HP,
2 9312Q6) When do you get a screen for " maintaining the authorization values for org elements " in PFCG ??? (i.e..screen you get thru PFCG --> AUTHORIZATION tab --> CHANGE AUTHORIZATION DATA --> SCREEN FOR MAINTAINING ORG ELEMENT VALUES )
HP,
3 8836hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?
2 7436hi tel me what is the use os SNC tab page in su01, and how to configure it , give me example for this,and how it can used in real time
2 8923Hello sap guru, does anyone pls know where sap written the VIRSA FIREFIGHTER LOGS ? I MEAN TO SAY WHEN USER GET OUT FORM THE SYSTEM AFTER USING FF ID A TEXT FILE SENT TO CONTROLLER AND I NEED TO KNOW THOSE LOGS THAT WHERE SAP WRITTEN LOGS IN THE SYSTEM...........ASAP PLEASE
1 6007Post New SAP Security Questions
What is audit information system?
How to find ECC system, GRC system and BI system ?
What are se10 t-codes used for?
Which transaction should not be given to BASIS and DEV team in Production?
What is the difference between usobx_c and usobt_c?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Can you explain internet-level security?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
Which tables will you use for making customizing setting for security administration?
How to codify for an Item in SAP? How many digits are required for an item?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
What is the difference between the table buffer and the user buffer?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
how we do CUA configuration in Quality system
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help