1.Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
2 12335Hi I cleared all rounds of Accenture but my preffered location was Gurgaon, as they dint had anything for me in Delhi /NCR they have put me on hold. I am worried will they call me again. please help
2 7601whts the differents between SoX ,SoD??????wht kind of work Sox do as wel .....SoD do? whts is virsa??????? and VRAT,,,,VFAT,, how it workin security.
IBM,
3 14894Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
IBM,
3559How to check to which web links user has access ? bcoz its not there any option in SUIM for this search and we add web links/reports while creating role. So how to check that ?
2 7476Post New SAP Security Questions
Explain protecting public keys?
What does the item category specify in a purchasing order in SAP Materials Management?
What are se09 t-codes used for?
what is use of copy data in derived role and when we use this one ???
How we Provided Security design, configuration, and support for SAP Enterprise Portals
what is user buffer?
Any details about secatt apart from SAPSecurity online.com?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Tell me about derived role?
What is audit information system?
Can you explain snc in sap security?
Explain x-glueb and its use in sap security.
How to create users?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take