Q5) What is the procedure you follow in your company as a security admin when a end user complains that he is unable to perform or execute an action in a particular tcode?
HP,
2 8645Q6) When do you get a screen for " maintaining the authorization values for org elements " in PFCG ??? (i.e..screen you get thru PFCG --> AUTHORIZATION tab --> CHANGE AUTHORIZATION DATA --> SCREEN FOR MAINTAINING ORG ELEMENT VALUES )
HP,
3 8134hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?
2 6851hi tel me what is the use os SNC tab page in su01, and how to configure it , give me example for this,and how it can used in real time
2 8409Hello sap guru, does anyone pls know where sap written the VIRSA FIREFIGHTER LOGS ? I MEAN TO SAY WHEN USER GET OUT FORM THE SYSTEM AFTER USING FF ID A TEXT FILE SENT TO CONTROLLER AND I NEED TO KNOW THOSE LOGS THAT WHERE SAP WRITTEN LOGS IN THE SYSTEM...........ASAP PLEASE
1 5679Post New SAP Security Questions
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Which t-code can be used to delete old security audit logs?
How to assign any program to user?
How we Educated client personnel in R/3 Security and general Basis knowledge
How to codify for an Item in SAP? How many digits are required for an item?
What are se10 t-codes used for?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What are the different types of sap security tables?
Tell me about derived role?
What is the use of tmssup* rfc destinations?
Differentiate between derived role and composite role
Differentiate between temp role and copy role
When would you update a sap table directly? What precautions would you taje?
What does the pfcg_time_dependency clean up?
What is sap cryptographic library?