Answer Posted / venu
Global Rule Set
| Is This Answer Correct ? | 9 Yes | 10 No |
Post New Answer View All Answers
What is the difference between usobx_c and usobt_c?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
What is the difference between the table buffer and the user buffer?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
how a t code works
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How can I do a mass delete of the roles without deleting the new roles?
How we Educated client personnel in R/3 Security and general Basis knowledge
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What is sap cryptographic library?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
What is a composite role?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
Differentiate between saml token profile and a sap logon ticket
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?