Q)if u r using 10 firefighter ids at a time? How will the
log reports goes to controller?
Q)wt is ruleset? and how to update risk id in rule set?
Q)wt is the procedure for Role modifications?explain with
example?
Q)who will done user comparision?
Answer Posted / anjibabu
1) log reports send through ( mail , workflow or
logdispaly ) these are available at options tab when we are
assigning fids to the controller tab.
2) ruleset which contains ( busniessprocess , risks ,
function and action,authorisations ) is know as rule set.
| Is This Answer Correct ? | 2 Yes | 1 No |
Post New Answer View All Answers
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
How we Provided Security design, configuration, and support for SAP Enterprise Portals
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Explain internet-level security?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
what is the different b/w su10 and su12
Differentiate between saml token profile and a sap logon ticket
How we schedule and administering background jobs?
Why is it important to delete sap-new profile? What steps will you take to do this?
What are the different types of sap security tables?
what is use of copy data in derived role and when we use this one ???
What are the most used tables in sap?
Can you explain sap system transactions?