Answer Posted / avinash
It is used for generation of profiles for mass number of roles
Is This Answer Correct ? | 17 Yes | 0 No |
Post New Answer View All Answers
what is authorization object and authorization object class?
Explain secure store and forward?
Can you explain internet-level security?
Pfcg proposed activities but you need only two. What would you do?
Explain transport system-level security?
What is the use of Personalization tab in SU01?
Can you explain sap system transactions?
Any details about secatt apart from SAPSecurity online.com?
Which t-code can be used to delete old security audit logs?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How to find out who has deleted users in the system?
How to create users?
How to codify for an Item in SAP? How many digits are required for an item?
what is the difference between usobt_c and usobx_c?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.