What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
997what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
TCS,
1023What does the account assessment category specify in a purchasing document in SAP Materials Management?
935What does the account assessment category specify in a purchasing order in SAP Materials Management?
1012What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
928If we have UK roles in our system and we want to find the AUS australian role how you will find the same
2 2889How many profiles we can add to role and if already user has 312 profiles the, how will you provide more profile to user?
2 2837Post New SAP Security Questions
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Explain document transfer-level security?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What are the upgrades happened in GRC 5.3 from GRC 5.2?
What is sap’s grc?
What are st01 t-codes used for?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
What does the profile generator do?
what is authorization object and authorization object class?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
what are the issues you faced with UME?
User is not there in User master record. Then how to trace the user?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.