Answer Posted / shankarreddy08
We can restrict with the help of Auth.Group(field values:P_Group for Programmes) and this Auth.Group is assigned under the S_Develop and S_programme(optional).
S_develop-> Helps to develop teh programmes.
S_Programme-> Used to execute the programme either in Forground /background
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is use of derived roles?
what is the critical issue u are faced in your previous experience
Attributes in SE01?
what is sod in sap security?
Explain x-glueb and its use in sap security.
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is the use of tmssup* rfc destinations?
What does the item category specify in a purchasing order in SAP Materials Management?
Explain internet-level security?
How to codify for an Item in SAP? How many digits are required for an item?
How to do Role Design, Testing and Implementation
How to run the daily background job s for virsa violations ? thabks in advance