1.WHAT IS DIFFERENCE B/W OWNER,CONTROLER AND ADMINISTRATOR IN
FF?
2.WHAT IS THE DIFFERENCE B/W THESE PERSONS ROLES?
3.WHAT IS THE ONLINE AND OFFLINE RISKS?
Answers were Sorted based on User's Feedback
Answer / rahman shaik
FF admin have complete access to FF programs
.Creating FF IDS
.Assigning FF IDS to owners & controllers
.Assigning FF IDS to firefighters
FF owner
.owners have only access of FF IDS assigned by FF ADMIN
FF controller
. Receives e-mails notification of FF IDS logins
.Display access of logs
Is This Answer Correct ? | 12 Yes | 0 No |
Offline Risk analysis is not real- time data but is dependent on the data of the last batch risk Analysis.
Online Risk is real - time data analysis.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / ramana
Owner will decide to whom the FF id need to create and
change the validity of FF id
Controller will monitor all the activities performed by FF
ID
Owner role will has the S_TABU_DIS with activity 02 and 03
where as controler role has the object S_TABU_DIS with
activity 03 only
Please correct me if i am wrong
Is This Answer Correct ? | 2 Yes | 1 No |
Answer / rahman shaik
in FF Most of the items like owner is main person for that id and controller is under owner and admin is to view the logs and update for auditing
Is This Answer Correct ? | 0 Yes | 5 No |
What is Sap security t-codes?
Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur
How we do Scheduled jobs in background to cleanup spool request, dumps
i have one role in development then this role need to be available in production how to achieve this?
what is the advantage of cua from a layman/manager point of view?
Which of below authorization object that protect transaction code execution? A. S_TCODE B. P_TCODE C. Q_TCODE D. X_TCODE
6 Answers Cap Gemini, SAP Labs,
What is audit information system?
what is transaction variant?
In an environment of derived roles ; a user is asking for a t-code ; which is not found in suim in search of roles ? what will u do ?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
what is centralized n decentralized
How to find ECC system, GRC system and BI system ?