how do we test security systems.what is the use of SU56
Answers were Sorted based on User's Feedback
Answer / rajasekharreddy
reset the user buffer and we are reset other user buffer
also
Is This Answer Correct ? | 7 Yes | 0 No |
Answer / badal
Through Tcode SU56 ,We will check the users buffer
Is This Answer Correct ? | 6 Yes | 0 No |
How will you mitigate a user against an authorization object which is decided as sensitive by Business
Whr will u find u Generation logs in BI security and What are Generation logs will come
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
I want to lock all the users except sap* and DDIC of a particular client ?
Is SU25 step(2nd) is mandatory when SAP up-gradation happened?
Plz can anybody share ur work experience on Mitigating conflicts using SoDs with GRC tools or without GRC (thankful if examples r provided)
What is difference between BW and BI Security?
under description ; in creating a role what should be written over there ....what does ur company follows ??
difference between logon tab and group tab in su10
Which tables will you use for making customizing setting for security administration?
What does SAP recommend regarding the RFC naming convention?
How to identify which Authorization Objects contains which fields \ activities?