Q5) What is the procedure you follow in your company as a security admin when a end user complains that he is unable to perform or execute an action in a particular tcode?
HP,
2 8593Q6) When do you get a screen for " maintaining the authorization values for org elements " in PFCG ??? (i.e..screen you get thru PFCG --> AUTHORIZATION tab --> CHANGE AUTHORIZATION DATA --> SCREEN FOR MAINTAINING ORG ELEMENT VALUES )
HP,
3 8087hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?
2 6809hi tel me what is the use os SNC tab page in su01, and how to configure it , give me example for this,and how it can used in real time
2 8367Hello sap guru, does anyone pls know where sap written the VIRSA FIREFIGHTER LOGS ? I MEAN TO SAY WHEN USER GET OUT FORM THE SYSTEM AFTER USING FF ID A TEXT FILE SENT TO CONTROLLER AND I NEED TO KNOW THOSE LOGS THAT WHERE SAP WRITTEN LOGS IN THE SYSTEM...........ASAP PLEASE
1 5630Post New SAP Security Questions
What authorization are required to create and maintain user master records?
What is Sap security t-codes?
Differentiate between temp role and copy role
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
what is the process to find that one consultant had removed a table from sap tables
when performing client copies what steps you need to take from CUA point of view?
What appears as the last sentence in sap note 587410?
What does user compare do?
Can you explain network topology in sap systems?
What are the different types of sap security tables?
what things you have to take care before executing run system trace?
By which parameter number of entries are controlled in the user buffer?
How do we test security systems.
What is stad?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation