SAP R/3, BI, HR, EP Security, GRC AC 5.3, XI/PI Administration
www.learnbasis.com
Answer / sravan
SAP R/3, BI, HR, EP Security, GRC, XI/PI Administration
From the experts in the industry with 6+ years of realtime
experience
----------------------------------------------------------
1. Fully interactive sessions & topics are designed as per
the real-time processes/procedures
2. Training delivered by industry experts with 15+ years of
experience in IT.
3. Online SAP & GRC access (No hassles in installing SAP on
your system)
4. Easy to understand reference documents which includes
some CBTs (Computer Based Tutorials.)
5. Full suite of R/3 authorizations along with rare topics
like Table authorization groups, Critical tcodes etc
6. BI 7.0 Analysis Authorizations and troubleshooting techniques
7. GRC Access control full suite along with rare topics like
role based Firefighters and Risk Terminator
8. 200+ FAQs and realtime troubleshooting techniques
9. Post session support when required
10. Sessions will be always one-on-one (online). No sessions
for group. This will make room for you to explore more.
11. Assistance with updating CV with security experience
12. Training only on GRC 5.3 (latest version in GRC) access
control suite.
***********************
For further details please contact sec_course@learnbasis.com
or sapsecuritiesgrc@gmail.com
www.learnbasis.com
*************************************************
Is This Answer Correct ? | 4 Yes | 4 No |
What is use Of SHDB (Transaction Recorder) ?
How we Check if the PFCG_TIME_DEPENDENCY is running for user master reconciliations.
What is the maximum number of authorization objects in a role?
what is routing rule , give one example?
Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
Could you please let me know the exact step by step process for the following Questions. 1.How to get the E-Mail address for 100 users at a time. 2.While Creating BW roles what are the Authorization Objects we will use. 3.While Creating Single role what will be happened in the functional side, when entered the Template role in the derived role tab. 4.when we changed the password for more users(for example:100 users) where the password will be stored or from where you can Re-Collect the password and how will you Communicate the password to all users at a time. 5.What is Virsa? Once you entered in to the screen what it will perform. 6.What is the use of SU24 & SM24. 7.While Creating BW roles what are the Authorization Objects we will use. 8.While Creating Single role what will be happened in the functional side, when you entered the Template role in the derived role tab. 9.What is Dialog users, Batch users and Communicate users. What is the use with Communicate user. 10.Can we add one Composite role in to another Composite role at any urgent user requests or in normal user requests. 11.In Transport what type of Request we will use.Why don't we use Workbench request in transport. 12.When we added Authorization Object in Template role, at the same time what will be happen in Derived role. 13.How to Check Profile parameter. And how to find whether any transport has ended with error and where we can check. 14.How to Extract users list like who didn't login since 3 months. And In 90 Days user Locking in which table we will use. 15.What is OSS Connection and System Opening and why we have to open these. 16.What will have in one single role and how many prifiles will be in one sap cua system. 17.What is the difference between Template role & Derive role.
Tell me about derived role?
You want to create and maintain user master record. What authorization would you need?
i need to give authorisation to a user to su01 tcode but the delete options should not work..i,e the user should be able to Create,disp,change etc but not delete on su01. how cam i do this?
How we Creat Mass users via writing LSMW scripts.
Which transaction code is used to display the user buffer?
What are the authorization objects which are always present in user master record?