SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 5393The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
2223What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 14579Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 9053Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 12789Post New SAP Security Questions
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
how you can delete multiple roles from qa, dev and production system?
what is centralize FFID?
What does the item category specify in a purchasing order in SAP Materials Management?
What are su25 t-codes used for?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
How to create users?
Authorization check on s_btch_job failed. What would happen now?
Can you explain transport system-level security?
Which tables will you use for making customizing setting for security administration?
What are st01 t-codes used for?
What is audit information system?