After maintaining authorization fields, we save and generate the profile. But it prompts for the profile name right when we click on 'Save' icon. So what is the basic difference between Saving and Profile Generating?
9 18818In 4.7 EE, we have an option as User -> Settings -> Automatic Comparison at Save. Is it right if i say that this option checked will automatically prompt for User cpompare when we simply save the data after entering the users to the role? But whether the option is checked or not i did not get any prompt for User compare on saving the data after entering Users info in the role. My another doubt is whats the difference between User and Complete Compare options. If i dont do complete Compare, wiill that effect? Is it right if i say that User compare assigns the users to the role and Complete Compare updates the user master recoirds , i.e., User master record comparison is current.
3 8077Hello!!! We are asked to generate a report/collect data on users concurrently accessed to the system and what operations they performed with their concurrent access. Apart from they want info on the duration of thier concurrent/normal session (date, time etc). Can anyone help us to know any particular transactions (as of our knowledge STAT & STAD can render certain segment of data), reports available with SAP to collect the above requested info.
5 13597Hi This is Prakash . Can any one tell me what is the use of SU24 and SU25 transaction code exactly
8 25720Hi , Currently i am working in an MNC company as an SAP Security tier1 member , we will take care of User Administration , Profile/authorization administration activities .Could any one tell me , is i am eligible to apply for an SAP Security job for 2 years experience . Could any one tell me about SOD , SOX Audit and Virsa tool , i have never worked before . Prakash
IBM,
3 13256Does anyone know what kind of questions does the Accenture asks on Interview as SAP Security Consultant?
2 15078Post New SAP Security Questions
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Differentiate between usobx_c and usobt_c
How can I do a mass delete of the roles without deleting the new roles?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Can you explain internet-level security?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
how a t code works
What is the difference between role and a profile?
Explain snc in sap security?
what things you have to take care before executing run system trace?
What are su56 t-codes used for?
Pfcg proposed activities but you need only two. What would you do?
What is use of derived roles?
Differentiate between derived role and composite role