how many composite roles can be assigned to a user ?
Post New Answer View All Answers
What are su25 t-codes used for?
What does the profile generator do?
what is centralize FFID?
What are the most used tables in sap?
what are the issues you faced with UME?
Can you explain internet-level security?
what is user base in sap security?
What are the different types of sap security tables?
What is the difference between the table buffer and the user buffer?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Can you explain document transfer-level security?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
could anyone tell me how we can copy the mass roles from sap_all profiles???????
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?