A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
1189How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
1055Post New SAP Security Questions
What is the use of su56?
What are se09 t-codes used for?
Pfcg proposed activities but you need only two. What would you do?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Can you explain sap system transactions?
What appears as the last sentence in sap note 587410?
Can you explain snc in sap security?
What are su56 t-codes used for?
Can you explain secure store and forward?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
Can you explain protecting public keys?
what is use of copy data in derived role and when we use this one ???
How to do Role Design, Testing and Implementation
Explain protecting public keys?