How to restrict a newly created program ?
We can restrict with the help of Auth.Group(field values:P_Group for Programmes) and this Auth.Group is assigned under the S_Develop and S_programme(optional).
S_develop-> Helps to develop teh programmes.
S_Programme-> Used to execute the programme either in Forground /background
Is This Answer Correct ? | 2 Yes | 0 No |
how do we test security systems.what is the use of SU56
what do you mean by profile and obeject
Is it possible to have more than one st of org-level values in one role? Explain your answer.
what is authorization object and authorization object class?
What is difference bewteen 4.7 ,ECC 5 and ECC6 from SAP Securtiy point of view
How to trace a Report User (Business User) in SAP BI?
Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???
Could you please let me know the exact step by step process for the following Questions. 1.How to get the E-Mail address for 100 users at a time. 2.While Creating BW roles what are the Authorization Objects we will use. 3.While Creating Single role what will be happened in the functional side, when entered the Template role in the derived role tab. 4.when we changed the password for more users(for example:100 users) where the password will be stored or from where you can Re-Collect the password and how will you Communicate the password to all users at a time. 5.What is Virsa? Once you entered in to the screen what it will perform. 6.What is the use of SU24 & SM24. 7.While Creating BW roles what are the Authorization Objects we will use. 8.While Creating Single role what will be happened in the functional side, when you entered the Template role in the derived role tab. 9.What is Dialog users, Batch users and Communicate users. What is the use with Communicate user. 10.Can we add one Composite role in to another Composite role at any urgent user requests or in normal user requests. 11.In Transport what type of Request we will use.Why don't we use Workbench request in transport. 12.When we added Authorization Object in Template role, at the same time what will be happen in Derived role. 13.How to Check Profile parameter. And how to find whether any transport has ended with error and where we can check. 14.How to Extract users list like who didn't login since 3 months. And In 90 Days user Locking in which table we will use. 15.What is OSS Connection and System Opening and why we have to open these. 16.What will have in one single role and how many prifiles will be in one sap cua system. 17.What is the difference between Template role & Derive role.
what is the procedure to delete a role?
6 Answers Cap Gemini, IBM, iGate,
What is the differences between AGR_1251 and AGR_1252?
what is CUA ? wat are the steps required to configure it ? and then hou does it work ?
why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute