Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

I want a list of users along with roles for a client ? hou
to do it?

Answer Posted / shoeb

SUIM will give u the best.

Is This Answer Correct ?    4 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2341


Explain secure store and forward?

1190


how to do Reporting and Analysis authorizations

2464


what is user base in sap security?

1717


What are st01 t-codes used for?

1155


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2588


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1479


Pfcg proposed activities but you need only two. What would you do?

1127


Differentiate between saml token profile and a sap logon ticket

1395


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1189


What is a composite role?

1456


Explain protecting public keys?

1269


Differentiate between derived role and composite role

1170


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1145


What are su22 t-codes used for?

1139