Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

How to find ECC system, GRC system and BI system ?

1230

What is the main difference between single role and a derived role?

1 2248

How to update risk id in rule set?

1155

What is use of derived roles?

1249

Tell me about derived role?

1075

Does s_tabu_dis org level values in a master role gets reflected in the child role?

1 2373

What is the procedure for role modifications?

1186

How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1185

How do we test security systems.

1112

What is the use of su56?

1141

What is the main purpose of parameters, groups & personalization tabs?

1119

What is the maximum number of authorization in an object?

1 1836

What is the maximum number of profiles in a role?

1 1953

What is the maximum number of authorization objects in a role?

1 2814

How to lock all the users at a time?

1 1964


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

In pfcg where we can add customized t-codes. And where we can see customized t-codes

1686


How to find ECC system, GRC system and BI system ?

1230


What does the profile generator do?

1125


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2722


when performing client copies what steps you need to take from CUA point of view?

2561


Can you explain protecting public keys?

1065


How to create users?

1220


what is the difference between usobt_c and usobx_c?

1351


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2341


Explain protecting public keys?

1268


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1189


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

2082


What is the difference between authorization object and authorization object class?

1130


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1185


What are su22 t-codes used for?

1139