How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
707Post New SAP Security Questions
Differentiate between derived role and composite role
What does the pfcg_time_dependency clean up?
What profile versions?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
What is the difference between usobx_c and usobt_c?
How to find ECC system, GRC system and BI system ?
What is audit information system?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How to find out who has deleted users in the system?
what is the critical issue u are faced in your previous experience
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Explain sap system transactions?
Can you explain secure store and forward?
What are su25 t-codes used for?
How can sap security be improved?