1.Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
2 11831Hi I cleared all rounds of Accenture but my preffered location was Gurgaon, as they dint had anything for me in Delhi /NCR they have put me on hold. I am worried will they call me again. please help
2 7011whts the differents between SoX ,SoD??????wht kind of work Sox do as wel .....SoD do? whts is virsa??????? and VRAT,,,,VFAT,, how it workin security.
IBM,
3 14015Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
IBM,
3265How to check to which web links user has access ? bcoz its not there any option in SUIM for this search and we add web links/reports while creating role. So how to check that ?
2 7041Post New SAP Security Questions
What authorization are required to create and maintain user master records?
what is centralize FFID?
What is the use of su56?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
How do you check background jobs?
what is user base in sap security?
what is the critical issue u are faced in your previous experience
What does the pfcg_time_dependency clean up?
What is the use of tmssup* rfc destinations?
Authorization check on s_btch_job failed. What would happen now?
How to assign any program to user?
Can you explain transport system-level security?
What is sap cryptographic library?
How we schedule and administering background jobs?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.