Hi
we are working on the one company but location are different one location we are restrict the user pass word length 8 characters another location pass word length 10 characters but client is same and also we are maintaining the one app server.
Could please help on this
Answer Posted / hemnth
Use Security Policies ( T-code : SECPOL ).
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
what is centralize FFID?
What is Sap security t-codes?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
Explain protecting public keys?
Can you explain document transfer-level security?
What is the use of su56?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
How to codify for an Item in SAP? How many digits are required for an item?
What authorization are required to create and maintain user master records?
Can wildcards be used in authorizations?
What does the pfcg_time_dependency clean up?
Why is it important to delete sap-new profile? What steps will you take to do this?
How to assign any program to user?