Plz can anybody share ur work experience on Mitigating
conflicts using SoDs with GRC tools or without GRC (thankful
if examples r provided)
Answer Posted / jayesh
First up all there no option available for Mitigation with
GRC tool as per my experiance.
you can create mitigation controle s per you requirment.
| Is This Answer Correct ? | 0 Yes | 6 No |
Post New Answer View All Answers
Can you explain secure store and forward?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Which transaction code is used to display the user buffer?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What does the item category specify in a purchasing order in SAP Materials Management?
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
In pfcg where we can add customized t-codes. And where we can see customized t-codes
what is your ticketing tool? can we give some details about how we are getting tickets
Can you explain transport system-level security?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Differentiate between temp role and copy role
Can wildcards be used in authorizations?