In which table you can see authorization group for table and which table to see authorization group for program?
8 36117Which of below authorization object that protect transaction code execution? A. S_TCODE B. P_TCODE C. Q_TCODE D. X_TCODE
6 18891Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
ABC,
4002Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
ABC,
3451Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
2 15845Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?
HP,
2 13732Post New SAP Security Questions
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Explain protecting public keys?
What is the difference between usobx_c and usobt_c?
what is use of copy data in derived role and when we use this one ???
What is audit information system?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
what is the use of defaults tab in start menu
Can you explain internet-level security?
What authorization is required to create and maintain user master records?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
What are the uses of an authorization group?
Explain transport system-level security?
what is hypercare and go live support?
How can sap security be improved?