SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 5434The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
2251What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 14625Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 9105Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 12857Post New SAP Security Questions
Can you explain secure store and forward?
What are the different types of sap security tables?
How do you check background jobs?
what is your ticketing tool? can we give some details about how we are getting tickets
How we Provided Security design, configuration, and support for SAP Enterprise Portals
what is use of copy data in derived role and when we use this one ???
What is sap cryptographic library?
What are se10 t-codes used for?
When would you update a sap table directly? What precautions would you taje?
Explain x-glueb and its use in sap security.
How to update risk id in rule set?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Explain internet-level security?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
What is the main purpose of parameters, groups & personalization tabs?