How to find out who has deleted users in the system?
Which tables will you use for making customizing setting for security administration?
what is use of copy data in derived role and when we use this one ???
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
You want to remove a developer's and developer keys from a system. How would you do that?
what is the process to find that one consultant had removed a table from sap tables
What does the item category specify in a purchasing requisition in SAP Materials Management?
Can you explain document transfer-level security?
What are the different types of sap security tables?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What authorization is required to create and maintain user master records?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
What is sap cryptographic library?