In which table you can see authorization group for table and which table to see authorization group for program?
8 37357Which of below authorization object that protect transaction code execution? A. S_TCODE B. P_TCODE C. Q_TCODE D. X_TCODE
6 19963Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
ABC,
4224Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
ABC,
3660Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
2 16412Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?
HP,
2 14279Post New SAP Security Questions
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Tell me about derived role?
Explain secure store and forward?
What is the difference between usobx_c and usobt_c?
Differentiate between derived role and composite role
how we do CUA configuration in Quality system
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
what is the difference between usobt_c and usobx_c?
What is the difference between c (check) and u (unmaintained)?
what is the use of defaults tab in start menu
You want to remove a developer's and developer keys from a system. How would you do that?
How to do Role Design, Testing and Implementation
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How to update risk id in rule set?