One of the user logged into Production System, changed a table and then logged out. How will you track him?
2 13836How can find out wheather CUA(Central User Administration) is configured on your sap system?
SAIC,
3 10722Post New SAP Security Questions
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Can you explain protecting public keys?
Pfcg proposed activities but you need only two. What would you do?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What is the difference between the table buffer and the user buffer?
what is the main difference between the derived role and a single role?
How to codify for an Item in SAP? How many digits are required for an item?
What is the use of tmssup* rfc destinations?
What is the procedure for role modifications?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
how we can see FFID if firefighter not able to see FFids ?
Explain secure store and forward?
What are the different types of sap security tables?
Can you explain transport system-level security?