SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.
2 57161.What is the difference between Su24,su22,and su21? 2.What are the advantages of GRC in segregation of duties when we compare with virsa? 3.There is one derived role, if i copy the role of derived role will the parent or master role will be the same for the new which is derived from the derived role, if so why if not why? 4. what are the organizational level?
IBM,
3 24063Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur
10 17129What is the name of background job in FF that is responsible for sending notification and logs to FF id controller ?
IBM,
4 11587What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?
3 11821What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
13 29749I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?
1 8162Post New SAP Security Questions
what is the critical issue u are faced in your previous experience
Explain protecting public keys?
Pfcg proposed activities but you need only two. What would you do?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
When would you update a sap table directly?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Which t-code can be used to delete old security audit logs?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What are pfud t-codes used for?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the maximum number of profiles in a role and maximum number of object in a role?
how to do Reporting and Analysis authorizations