Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

How to assign more than 312 profiles to any user?? As 312 profiles are limited to assign in any user account.

Bosch, Infosys,

2 14974

How can assign miising authorizations in BI?

Philips,

1 11403

how to resolve role conflict

IBM,

2 10524

Hello All, Can any one tell me what are the sap tables will be used while trouble shooting authorization issue BW security activity

1 8228

what is the process to find that one consultant had removed a table from sap tables

2537

how to delete a role?

IBM,

2 7555

what is diff b/w su01 and su10?

IBM,

5 26753

what is SOD?

IBM,

3 9883

What are the upgrades happened in GRC 5.3 from GRC 5.2?

4206

Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?

3 13741

What's the use of Detour path? How Fork path differs from Detour path

1 10823

How will you mitigate a user against an authorization object which is decided as sensitive by Business

IBM,

1 8491

Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4713

Is it possible to assign two roles with different validity period to a user in one shot through GRC? If yes, how

2 11004

What does PRGN_STAT & TCODE_MOD table consist of?

2 10705


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2133


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4459


What are su22 t-codes used for?

1139


What are se09 t-codes used for?

1308


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1322


List the various user types.

1064


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2369


What are st01 t-codes used for?

1155


what is the main difference between the derived role and a single role?

1150


Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.

2206


Differentiate between usobx_c and usobt_c

1158


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

2082


explain the personalization tab within a role?

1381


What is the difference between authorization object and authorization object class?

1130


What is stad?

1170