I want a list of users along with roles for a client ? hou
to do it?
Answer Posted / shoeb
SUIM will give u the best.
| Is This Answer Correct ? | 4 Yes | 2 No |
Post New Answer View All Answers
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Explain secure store and forward?
how to do Reporting and Analysis authorizations
what is user base in sap security?
What are st01 t-codes used for?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Pfcg proposed activities but you need only two. What would you do?
Differentiate between saml token profile and a sap logon ticket
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What is a composite role?
Explain protecting public keys?
Differentiate between derived role and composite role
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
What are su22 t-codes used for?