How to identify which Authorization Objects contains which
fields \ activities?
Answer Posted / kishore
SE16 --> TACTZ -> Object --> give the Auth.Object name -->
Execute --> it will show the available activities.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What is the maximum number of profiles in a role and maximum number of object in a role?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What are se10 t-codes used for?
How to find ECC system, GRC system and BI system ?
What are su25 t-codes used for?
What is use of derived roles?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
how you can delete multiple roles from qa, dev and production system?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
When would you update a sap table directly? What precautions would you taje?
Explain network topology in sap systems?
How to run the daily background job s for virsa violations ? thabks in advance
User is not there in User master record. Then how to trace the user?
Can you explain secure store and forward?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.