SAP SECURITY Training in Hyderbad,contact 7893255000. R3
SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
Will provide guidance on real time concepts and profile
prepartion also.
Answer Posted / sapsecurity
Can you drop me your number
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is the critical issue u are faced in your previous experience
Can wildcards be used in authorizations?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What is use of derived roles?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What is the difference between c (check) and u (unmaintained)?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
Can you explain protecting public keys?
Which tables will you use for making customizing setting for security administration?
What are the uses of an authorization group?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
How to assign any program to user?
What are se10 t-codes used for?
What are the different types of sap security tables?