Answer Posted / kishore kumar vuthpala
Dialog (A)
System (B)
Communication (C)
Service (S)
Reference (L)
| Is This Answer Correct ? | 23 Yes | 0 No |
Post New Answer View All Answers
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Can you explain internet-level security?
what is use of copy data in derived role and when we use this one ???
Can you explain network topology in sap systems?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What are some ap security t codes?
What authorization are required to create and maintain user master records?
Can you explain transport system-level security?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
What are su25 t-codes used for?
Which tables will you use for making customizing setting for security administration?