Can you explain document transfer-level security?
difference between logon tab and group tab in su10
User done tasks with ffid n logged off but controller not get any log reports,why?
Which t-code can be used to delete old security audit logs?
User is not there in User master record. Then how to trace the user?
how to secure the customizing Tcodes in sap
what is the length of user buffer
Tell me about derived role?
Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help
i am asked to get through at "Authorizations analysis and correct assignments" wat does it mean and wat all concepts comes under these ?
what is the difference between user buffer and user contex?
can u tell me some of the password related parameters ?
List of transaction codes, users are executing for last 3 months