How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
933Post New SAP Security Questions
How we schedule and administering background jobs?
What is sap’s grc?
what is centralize FFID?
What appears as the last sentence in sap note 587410?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
By which parameter number of entries are controlled in the user buffer?
When would you update a sap table directly?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What are the uses of an authorization group?
how we can see FFID if firefighter not able to see FFids ?
User is not there in User master record. Then how to trace the user?