Plz can anybody share ur work experience on Mitigating conflicts using SoDs with GRC tools or without GRC (thankful if examples r provided)
CTS,
1 6527What is the main purpose of Parameters, Groups & Personalization tabs in SU01 and Miniapps in PFCG? thanks in advance
1 33927What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
4459Scheduled a job for user master reconciliation , a user is in a validity date and roles assigned to that user are in validity date, but for reasons roles has been removed from the user master record, what could be the reason, this is not related to position based security, could some explain?
2 7094under description ; in creating a role what should be written over there ....what does ur company follows ??
IBM,
10 13875How to find the already locked users list before a particular date. Example: list of users already locked before 25.03.2010
2 10734When validity of role is over its profile get deleted from master record but corresponding role remains as it is, Why ? Can we delete it automatically ?
2 8140What is difference between two sentences 1: " Using SUGR we allocate user to group ". 2: " In SU01 in Logon data we assign user to group " So, What is assigning and allocating ?
3 12052Is there any transaction to see Transport Log. Means, Which data or roles have been transported from which system at what time ?
3 8883Post New SAP Security Questions
Is it possible to change role template? How?
Can you explain sap system transactions?
What profile versions?
What is the difference between role and a profile?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
What are su25 t-codes used for?
Explain protecting public keys?
What is the use of tmssup* rfc destinations?
what is hypercare and go live support?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Can you explain snc in sap security?
Pfcg proposed activities but you need only two. What would you do?
By which parameter number of entries are controlled in the user buffer?
What are the uses of an authorization group?