What is the difference between authorization object and authorization object class?
Some User has made changes to Tables in SAP. How to identify that user?
In which table you can see authorization group for table and which table to see authorization group for program?
What are su25 t-codes used for?
1. what is the difference b/w change authorization mode and expert mode. 2.when we do the user comparison in pfcg what is the difference in complete comparison and expert mode comparison. 3. what are the critical auth objects in security point of you , 4.when we do the transportation of composite role what will happened . 5.while doing the kernel upgrade we download the executable s one by one are all together. 6. while applying the patches what is the importance of test import why we do test import
when performing client copies what steps you need to take from CUA point of view?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
for eaxmple we are creating Z-Tcode How to restrict and what level are restict.
1 .what are the authorization switches in security
what is centralized n decentralized
What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
how segregation of duties in sap security?
What is difference between BW and BI Security?