your functional team has asked you to provide the seurity for a tcode.how do you go about it?
2 8840one tcode,say sa38, is assigned to 10 diffrent users through a same role.I want to restrict one of those 10 users to execute only a few reports in sa38 but not all reports.what are the possible ways of getting it done?
3 14694How can we maintain Organizational values? How can we create Organizational values? What is the purpose of these Org. values?
2 16703Can anybody explain (short n simple) about SOX & SoDs with 3 examples for each functional module? n ur experience on SoDs.
IBM,
2 11465Post New SAP Security Questions
Which transaction should not be given to BASIS and DEV team in Production?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What is the use of su56?
Differentiate between saml token profile and a sap logon ticket
Differentiate between temp role and copy role
What is stad?
Explain network topology in sap systems?
By which parameter number of entries are controlled in the user buffer?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Can you explain snc in sap security?
What is sap internet transaction server?
what is the use of defaults tab in start menu