how a t code works
Explain protecting public keys?
What are suim t-codes used for?
for eaxmple we are creating Z-Tcode How to restrict and what level are restict.
what is the use of s_tabu_nam,s_tabu_dis,s_tabu_cli
Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?
What is difference between BW and BI Security?
what is CUA ? wat are the steps required to configure it ? and then hou does it work ?
Hello sap guru, does anyone pls know where sap written the VIRSA FIREFIGHTER LOGS ? I MEAN TO SAY WHEN USER GET OUT FORM THE SYSTEM AFTER USING FF ID A TEXT FILE SENT TO CONTROLLER AND I NEED TO KNOW THOSE LOGS THAT WHERE SAP WRITTEN LOGS IN THE SYSTEM...........ASAP PLEASE
What does the item category specify in a purchasing requisition in SAP Materials Management?
How to do Role Design, Testing and Implementation
SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.
What is the use of su56?