Difference between S_tcode and Menu tab transactions?
Answer Posted / itsgaurav151
@ Karunakar : Yes user can access those t-codes if he/she have all chack objects maintained in Su24 along with appropriate values in his user buffer.
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What is use of derived roles?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
You want to create and maintain user master record. What authorization would you need?
what is the process to find that one consultant had removed a table from sap tables
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
What are pfud t-codes used for?
Explain internet-level security?
Explain network topology in sap systems?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
What is the maximum number of profiles in a role and maximum number of object in a role?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
what is user base in sap security?
How we Educated client personnel in R/3 Security and general Basis knowledge
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
How can I do a mass delete of the roles without deleting the new roles?