What is the impact of changing the SU24 objects for a t-
code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
Answer Posted / sanjay
Asia,
Everyone understood the question and replied accordingly except you. Words are changed but meaning is not.
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
Explain internet-level security?
what is user base in sap security?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
what is your ticketing tool? can we give some details about how we are getting tickets
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is the use of su56?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
What are su25 t-codes used for?
how you can delete multiple roles from qa, dev and production system?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.