Answer Posted / kishore kumar vuthpala
Dialog (A)
System (B)
Communication (C)
Service (S)
Reference (L)
| Is This Answer Correct ? | 23 Yes | 0 No |
Post New Answer View All Answers
How to find ECC system, GRC system and BI system ?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
What are su25 t-codes used for?
How can sap security be improved?
What are se10 t-codes used for?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What are su22 t-codes used for?
As a SAP security consultant what is the most challenged you faced in previous company?
Why is it important to delete sap-new profile? What steps will you take to do this?
Explain snc in sap security?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
By which parameter number of entries are controlled in the user buffer?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.