Answer Posted / avinash
It is used for generation of profiles for mass number of roles
| Is This Answer Correct ? | 17 Yes | 0 No |
Post New Answer View All Answers
How to find out who has deleted users in the system?
Explain document transfer-level security?
What is the use of su56?
By which parameter number of entries are controlled in the user buffer?
Which t-code can be used to delete old security audit logs?
Explain secure store and forward?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is the difference between role and a profile?
What does the item category specify in a purchasing order in SAP Materials Management?
How to do Role Design, Testing and Implementation
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
What is Sap security t-codes?
When would you update a sap table directly?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
what is the use of defaults tab in start menu