Hello!!! We are asked to generate a report/collect data on users concurrently accessed to the system and what operations they performed with their concurrent access. Apart from they want info on the duration of thier concurrent/normal session (date, time etc). Can anyone help us to know any particular transactions (as of our knowledge STAT & STAD can render certain segment of data), reports available with SAP to collect the above requested info.
5 15929one tcode,say sa38, is assigned to 10 diffrent users through a same role.I want to restrict one of those 10 users to execute only a few reports in sa38 but not all reports.what are the possible ways of getting it done?
3 14945In which table you can see authorization group for table and which table to see authorization group for program?
8 37640Which of below authorization object that protect transaction code execution? A. S_TCODE B. P_TCODE C. Q_TCODE D. X_TCODE
6 20174What is the maximum number of profiles in a role ? What is the maximum number of authorization objects in a role? What is the maximum number of authorization in an object ?
5 28986Post New Cap Gemini SAP Security Interview Questions
What is nested function in excel?
How failures in execution are handled with include() and require() functions?
what is the synchonus? wht is the diff between synchronous and asynchronous what is the diff between v1 and v2 v3 delta modes in sap ecc
IN 2000 WORDS, KINDLY DESCRIBE YOUR REACTIONS WHEN FACED WITH THE FOLLOWING TECHNICAL DECISIONS: 1. YOU NEED TO MAKE AN EXECUTIVE DECISION AND YOUR BOSS IS OUT ON A CONFERENCE MEETING WHAT ARE YOUR CHOICES? 2. WHEN FACED WITH AN ADMINISTRATIVE PROBLEM HOW DO YOU RESPOND TO THAT PROBLEM 3. WHAT DO YOU UNDERSTAND BY A VENDOR'S RECONCILIATION STATEMENT.
Why do you want to join the banking industry?
What are the causes of L.O. high temperature?
What is the copy idms subschema-binds?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Different types of locks?
Is set c++?
What is the wordpress codex?
What is tracert?
What is standard output in python?
What is sosl, soql and dml in salesforce?
Who unix commands?