What does SAP recommend regarding the RFC naming convention?
Answer Posted / wasi
GRCCLNT100
Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
what is the process to find that one consultant had removed a table from sap tables
User is not there in User master record. Then how to trace the user?
how to do Reporting and Analysis authorizations
Explain transport system-level security?
what is user base in sap security?
How to update risk id in rule set?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Can you explain sap system transactions?
how we do CUA configuration in Quality system
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Can you explain internet-level security?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
what is your ticketing tool? can we give some details about how we are getting tickets