Which t-code can be used to delete old security audit logs?
difference between BRF flat rule in BRF flat rule lineitem by lineitem.
You want to remove a developer's and developer keys from a system. How would you do that?
what is the user table including account number and cost center in one table?
Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur
explain the personalization tab within a role?
What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
Hello All, Can any one tell me what are the sap tables will be used while trouble shooting authorization issue BW security activity
1.why we use derived role in sap security?2.what is the technical difference between master and derived role?
Differentiate between usobx_c and usobt_c
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
whats the meaning of relocation in transport request ?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.