Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
1 2209Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???
1 28281.why we use derived role in sap security?2.what is the technical difference between master and derived role?
KPMG,
1 2278Post New SAP Security Questions
How do you check background jobs?
What are se09 t-codes used for?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What is sap cryptographic library?
How to update risk id in rule set?
What happens to change documents when they are transported to the production system?
What is the difference between c (check) and u (unmaintained)?
What is the maximum number of profiles in a role and maximum number of object in a role?
What is stad?
What are the most used tables in sap?
Which t-code can be used to delete old security audit logs?
What is audit information system?
Can you explain protecting public keys?
Explain x-glueb and its use in sap security.
You want to remove a developer's and developer keys from a system. How would you do that?