SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.
2 52251.What is the difference between Su24,su22,and su21? 2.What are the advantages of GRC in segregation of duties when we compare with virsa? 3.There is one derived role, if i copy the role of derived role will the parent or master role will be the same for the new which is derived from the derived role, if so why if not why? 4. what are the organizational level?
IBM,
3 23069Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur
10 15692What is the name of background job in FF that is responsible for sending notification and logs to FF id controller ?
IBM,
4 10858What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?
3 11228What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
13 27593I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?
1 7719Post New SAP Security Questions
What does the account assessment category specify in a purchasing order in SAP Materials Management?
what is hypercare and go live support?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
could anyone tell me how we can copy the mass roles from sap_all profiles???????
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
what is authorization object and authorization object class?
what are all the questions covered in "profiles related concepts " please let me know ?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
How do we test security systems.
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What profile versions?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Tell me about derived role?
What authorization is required to create and maintain user master records?