Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
1 2692Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???
1 32941.why we use derived role in sap security?2.what is the technical difference between master and derived role?
KPMG,
1 2747Post New SAP Security Questions
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
how you can delete multiple roles from qa, dev and production system?
What is sap’s grc?
What happens to change documents when they are transported to the production system?
What are pfud t-codes used for?
What are su22 t-codes used for?
what is user base in sap security?
Differentiate between usobx_c and usobt_c
What is the maximum number of profiles in a role and maximum number of object in a role?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Attributes in SE01?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS