Answer Posted / karunakar
It is an activity which is carried to determined who can do
what and up to what extend,
| Is This Answer Correct ? | 3 Yes | 1 No |
Post New Answer View All Answers
Can you explain network topology in sap systems?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
Why is it important to delete sap-new profile? What steps will you take to do this?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Explain document transfer-level security?
What is sap’s grc?
How to run the daily background job s for virsa violations ? thabks in advance
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
What is the use of Personalization tab in SU01?
Differentiate between derived role and composite role
What is t code?
Explain x-glueb and its use in sap security.
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
What does the account assessment category specify in a purchasing document in SAP Materials Management?