What is the impact of changing the SU24 objects for a t-
code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
Answer Posted / sanjay
Asia,
Everyone understood the question and replied accordingly except you. Words are changed but meaning is not.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
How to assign any program to user?
Which tables will you use for making customizing setting for security administration?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
What are su25 t-codes used for?
How can sap security be improved?
What is the difference between authorization object and authorization object class?
What are st01 t-codes used for?
Attributes in SE01?
what is user buffer?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Can you explain snc in sap security?
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?