When transporting a role. What table & table data gets transported. Exact table names please?
2 7782I have a custom tables, for which I created auth group, which contains another 2 tables. Now I have assigned this table to user, but still he cannot access the table. What's the reason? User buffer is fine and not exceeded.
HCL,
2 5279Providing training for SAP Security & GRC. SAP Security includes ECC Security,HR Security,SRM Security,CRM SECURITY,BI Security GRC 10.0 & 10.1 For further details send an email to sapsecuritygrc5.3@gmail.com or contact 971 563356167
CCC,
2 3399Post New SAP Security Questions
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
What are se10 t-codes used for?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
How do you check background jobs?
What profile versions?
Can wildcards be used in authorizations?
By which parameter number of entries are controlled in the user buffer?
What are su25 t-codes used for?
What are se09 t-codes used for?
Can you explain internet-level security?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
How to do Role Design, Testing and Implementation
Any details about secatt apart from SAPSecurity online.com?
Can you explain network topology in sap systems?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects