Answer Posted / krishna
6. To add to the above points we need to consider the SU24 changes as well.
7. Take all the required approvals from the respective stakeholders before moving the changes to Quality system for testing. To avoid any further changes.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Any details about secatt apart from SAPSecurity online.com?
What is the difference between role and a profile?
what is authorization object and authorization object class?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
Can you explain document transfer-level security?
What is the maximum number of profiles in a role and maximum number of object in a role?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Differentiate between derived role and composite role
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What is the use of su56?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
what is the difference between usobt_c and usobx_c?
Differentiate between usobx_c and usobt_c
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.