How to insert missing authorization?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Can you explain network topology in sap systems?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
What authorization are required to create and maintain user master records?
What are su22 t-codes used for?
How we schedule and administering background jobs?
How to find out who has deleted users in the system?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
Explain secure store and forward?
List the various user types.
What are pfud t-codes used for?