What are the issues will face while creating user in the
system ?
Answer Posted / vaishali
The following fields are necessary for creating a a user.
1) System name along with the client number.
2) Last name.
3) E-mail address, so that password is sent to user after
user is created.
4) Validity end date for contractors.
5) User group.
6) Roles(not mandatory. General role are provided by
default if not mentioned)
7) Approvals from BSC and line manager is a must.
| Is This Answer Correct ? | 7 Yes | 2 No |
Post New Answer View All Answers
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
What is the difference between authorization object and authorization object class?
explain the personalization tab within a role?
What does the profile generator do?
What is the difference between usobx_c and usobt_c?
Can wildcards be used in authorizations?
how a t code works
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What are pfud t-codes used for?
Support types of WOs you have faced?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
Explain transport system-level security?