Give an example of SOD with object level control & also
decide the Risk implication from the Technical standpoint.
No Answer is Posted For this Question
Be the First to Post Answer
What are su 24 t-codes used for?
How to create a simple or single role.?
What are the issues will face while creating user in the system ?
why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute
How to trace the Users in BI Security and give me navigation
How can you lock all the users at a time?
Can you explain internet-level security?
Mention which t-codes are used to see the summary of the authorization object and profile details?
Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???
what is the use of s_tabu_nam,s_tabu_dis,s_tabu_cli
What is sap cryptographic library?
1 .what are the authorization switches in security