Answer Posted / kishore kumar vuthpala
Dialog (A)
System (B)
Communication (C)
Service (S)
Reference (L)
| Is This Answer Correct ? | 23 Yes | 0 No |
Post New Answer View All Answers
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How to create users?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Which tables will you use for making customizing setting for security administration?
Can you explain transport system-level security?
What are st01 t-codes used for?
what is centralize FFID?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
What is the use of su56?
Can you explain internet-level security?
What is the use of Personalization tab in SU01?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
what is the critical issue u are faced in your previous experience