Answer Posted / karunakar
It is an activity which is carried to determined who can do
what and up to what extend,
| Is This Answer Correct ? | 3 Yes | 1 No |
Post New Answer View All Answers
Can you explain sap system transactions?
Which t-code can be used to delete old security audit logs?
When would you update a sap table directly?
What appears as the last sentence in sap note 587410?
What authorization are required to create and maintain user master records?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
What is stad?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
Differentiate between temp role and copy role
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Any details about secatt apart from SAPSecurity online.com?
What are pfud t-codes used for?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)