Answer Posted / yatin
The question need to be reframed otherwise irrelevant.
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What does the profile generator do?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
What is the use of tmssup* rfc destinations?
What are the different types of sap security tables?
Authorization check on s_btch_job failed. What would happen now?
What is the use of su56?
How to insert missing authorization?
what is the use of defaults tab in start menu
Explain network topology in sap systems?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
You want to remove a developer's and developer keys from a system. How would you do that?