Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
1 3105Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???
1 37961.why we use derived role in sap security?2.what is the technical difference between master and derived role?
KPMG,
1 3199Post New SAP Security Questions
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
Pfcg proposed activities but you need only two. What would you do?
Explain protecting public keys?
What is Sap security t-codes?
when performing client copies what steps you need to take from CUA point of view?
You want to remove a developer's and developer keys from a system. How would you do that?
what is use of copy data in derived role and when we use this one ???
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Can you explain secure store and forward?
Attributes in SE01?
Explain secure store and forward?
Support types of WOs you have faced?
Can you explain transport system-level security?
When would you update a sap table directly?