Answer Posted / knreddy
dilog user, syste user, trns por use, like that 5 type of
users
| Is This Answer Correct ? | 0 Yes | 30 No |
Post New Answer View All Answers
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Can you explain internet-level security?
Support types of WOs you have faced?
How to find out who has deleted users in the system?
Explain internet-level security?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Can you explain document transfer-level security?
what is the main difference between the derived role and a single role?
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
Pfcg proposed activities but you need only two. What would you do?
What are st01 t-codes used for?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
what is authorization object and authorization object class?