Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How to restrict Table access in SAP?

Answer Posted / amitesh

USING S_TABU_DIS AUTH OBJECT WE CAN RESTRICT THE ACCESS TO
THE TABLES.IF WE NEED TO FIND ACCESS TO THE TABLE FIRST WEE
NEED TO FIND TABLE AUTH GROUP.USING SE54 TCODE WE CAN FIND
TABLE AUTH GROUP.

Is This Answer Correct ?    10 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is sap cryptographic library?

1063


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1140


Differentiate between derived role and composite role

1162


How to codify for an Item in SAP? How many digits are required for an item?

2651


What is sap internet transaction server?

1181


What is the use of su56?

1137


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2335


Can you explain sap system transactions?

1134


Differentiate between usobx_c and usobt_c

1153


What is the difference between c (check) and u (unmaintained)?

1875


What is the difference between the table buffer and the user buffer?

1217


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2662


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1967


How we Educated client personnel in R/3 Security and general Basis knowledge

2267


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4703