Answer Posted / avinash
It is used for generation of profiles for mass number of roles
| Is This Answer Correct ? | 17 Yes | 0 No |
Post New Answer View All Answers
What is audit information system?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How we Educated client personnel in R/3 Security and general Basis knowledge
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
How do we test security systems.
Explain snc in sap security?
How to find out who has deleted users in the system?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Can you explain transport system-level security?
What does the item category specify in a purchasing requisition in SAP Materials Management?
Explain internet-level security?
What authorization is required to create and maintain user master records?
Which t-code can be used to delete old security audit logs?
How to run the daily background job s for virsa violations ? thabks in advance