SU24 must be set up before implementing any roles.
A. True
B. False
Answer Posted / himmatchavan
TRUE....
Do you any explanation ?
| Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
Explain x-glueb and its use in sap security.
How we schedule and administering background jobs?
How can sap security be improved?
what is the main difference between the derived role and a single role?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
What are su53 t-codes used for?
What are se10 t-codes used for?
What appears as the last sentence in sap note 587410?
How to create users?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What are some ap security t codes?