Answer Posted / sasigopal
Hi,
composit and single role commnly used.
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
Support types of WOs you have faced?
Explain x-glueb and its use in sap security.
what is the critical issue u are faced in your previous experience
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
Can wildcards be used in authorizations?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
how we can see FFID if firefighter not able to see FFids ?
What authorization is required to create and maintain user master records?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
What happens to change documents when they are transported to the production system?
what is use of copy data in derived role and when we use this one ???
Can you explain internet-level security?