what are the service market place activities from
authorizations point of view ?
Answer / sridhar
Requesting S user ids to login into SAP Service Market place
Generating Developer keys and Object keys
Maintaining login credentails for SAP SUPPORT at SAP MARKET
PLACE.
Is This Answer Correct ? | 5 Yes | 0 No |
what is the process to find that one consultant had removed a table from sap tables
How we Educated client personnel in R/3 Security and general Basis knowledge
how u add a roleowner in a role
How to assign sap_all to end user if i have approval?remember i do not have GRC.
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Differentiate between derived role and composite role
When transporting a role. What table & table data gets transported. Exact table names please?
Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help
How can we Lock transaction ? What happens exactly ?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
If SU53 screenshot does not give anything then How will you find the solution? If there is no relevant Role , then How?
Support types of WOs you have faced?