Answer Posted / re
go to se37
enter the function module name sccr lock client
| Is This Answer Correct ? | 7 Yes | 1 No |
Post New Answer View All Answers
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
Explain document transfer-level security?
What is the main purpose of parameters, groups & personalization tabs?
Why is it important to delete sap-new profile? What steps will you take to do this?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What is audit information system?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
What is sap internet transaction server?
what is use of copy data in derived role and when we use this one ???
How to create users?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What profile versions?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Which t-code can be used to delete old security audit logs?