When transporting a role. What table & table data gets transported. Exact table names please?
2 7757I have a custom tables, for which I created auth group, which contains another 2 tables. Now I have assigned this table to user, but still he cannot access the table. What's the reason? User buffer is fine and not exceeded.
HCL,
2 5257Providing training for SAP Security & GRC. SAP Security includes ECC Security,HR Security,SRM Security,CRM SECURITY,BI Security GRC 10.0 & 10.1 For further details send an email to sapsecuritygrc5.3@gmail.com or contact 971 563356167
CCC,
2 3373Post New SAP Security Questions
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
explain the personalization tab within a role?
What are the different types of sap security tables?
How we schedule and administering background jobs?
Which t-code can be used to delete old security audit logs?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
What does the profile generator do?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
What are su56 t-codes used for?
Can you explain protecting public keys?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
What are the most used tables in sap?