Pfcg proposed activities but you need only two. What would you do?
No Answer is Posted For this Question
Be the First to Post Answer
How can you find all t-codes which are locked in the system ?
What are the 5 things you'll do if you have sap system to maintain (Sap securiy)
1 Answers Accenture, Ernst Young,
what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
which role is commonly used
What are the different types of tabs that are present in the pfcg?
Can you explain document transfer-level security?
How to update risk id in rule set?
Whr will u find u Generation logs in BI security and What are Generation logs will come
What is the difference between Execution and Simulation in grc rar
What is the difference between the table buffer and the user buffer?
Hi, Can any one tell me the authorization objects for SOD
How to find list of roles which are not assigned to any user