SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 5365The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
2209What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 14553Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 9009Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 12736Post New SAP Security Questions
Can wildcards be used in authorizations?
how you can delete multiple roles from qa, dev and production system?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
what is authorization object and authorization object class?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
What is Sap security t-codes?
What are the uses of an authorization group?
Can you explain secure store and forward?
what is the use of defaults tab in start menu
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What are the most used tables in sap?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS