Answer Posted / santosh eswar reddy korrapati
first of all we need to enter su10 transaction and from
there go to authorization data tab and then copy all the
users( 100-1000) through clip board , form change tab
assign the role in which system you need and execute.
| Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
What is use of derived roles?
Which transaction code is used to display the user buffer?
What is the difference between authorization object and authorization object class?
As a SAP security consultant what is the most challenged you faced in previous company?
Differentiate between temp role and copy role
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
By which parameter number of entries are controlled in the user buffer?
Can you explain document transfer-level security?
what is the process to find that one consultant had removed a table from sap tables
Any details about secatt apart from SAPSecurity online.com?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
How to insert missing authorization?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Can you explain internet-level security?