What is use of derived roles?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Can you explain protecting public keys?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
What is sap internet transaction server?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
What is stad?
What are st01 t-codes used for?
Any details about secatt apart from SAPSecurity online.com?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is audit information system?
Can you explain snc in sap security?
Can you explain internet-level security?
What is sap’s grc?