SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 5794The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
2391What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 14977Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 9651Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 13390Post New SAP Security Questions
How to create users?
Is it possible to change role template? How?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
what is sod in sap security?
What profile versions?
What is Sap security t-codes?
when performing client copies what steps you need to take from CUA point of view?
User is not there in User master record. Then how to trace the user?
What is the maximum number of profiles in a role and maximum number of object in a role?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
What are se09 t-codes used for?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
List the various user types.
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'