Answer Posted / knreddy
dilog user, syste user, trns por use, like that 5 type of
users
Is This Answer Correct ? | 0 Yes | 30 No |
Post New Answer View All Answers
Explain x-glueb and its use in sap security.
What are su22 t-codes used for?
What appears as the last sentence in sap note 587410?
Explain protecting public keys?
What is a composite role?
How to do Role Design, Testing and Implementation
What is use of derived roles?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Which transaction should not be given to BASIS and DEV team in Production?
how we can see FFID if firefighter not able to see FFids ?
Explain secure store and forward?
How to insert missing authorization?
What is the procedure for role modifications?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this