Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Q)if u r using 10 firefighter ids at a time? How will the
log reports goes to controller?
Q)wt is ruleset? and how to update risk id in rule set?

Q)wt is the procedure for Role modifications?explain with
example?

Q)who will done user comparision?

Answer Posted / anjibabu

1) log reports send through ( mail , workflow or
logdispaly ) these are available at options tab when we are
assigning fids to the controller tab.

2) ruleset which contains ( busniessprocess , risks ,
function and action,authorisations ) is know as rule set.

Is This Answer Correct ?    2 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2136


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2725


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2330


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2238


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4464


Explain internet-level security?

1148


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1971


what is the different b/w su10 and su12

2989


Differentiate between saml token profile and a sap logon ticket

1395


How we schedule and administering background jobs?

1133


Why is it important to delete sap-new profile? What steps will you take to do this?

1135


What are the different types of sap security tables?

1113


what is use of copy data in derived role and when we use this one ???

1811


What are the most used tables in sap?

1221


Can you explain sap system transactions?

1138