why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute
5 9772. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
1 5987what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24
2 20143what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
1 3722I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?
3 15692what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
1 8705Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
IBM,
2240Post New SAP Security Questions
What does the item category specify in a purchasing order in SAP Materials Management?
Explain sap system transactions?
What does user compare do?
What is the main purpose of parameters, groups & personalization tabs?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Why is it important to delete sap-new profile? What steps will you take to do this?
1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security?
Explain internet-level security?
What are su22 t-codes used for?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
how we Set up Central User Administration (CUA) to manage 4 systems/clients
how we do CUA configuration in Quality system
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
What is the difference between the table buffer and the user buffer?
how you can delete multiple roles from qa, dev and production system?