Answer Posted / sreehari8281
determines a detour routing based upon an attribute of the request (for
example, SoD Violations Exist, Training Verification, No Role Owner)
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
How to assign any program to user?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
What does the item category specify in a purchasing requisition in SAP Materials Management?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
Any details about secatt apart from SAPSecurity online.com?
Explain document transfer-level security?
what is authorization object and authorization object class?
How to do Role Design, Testing and Implementation
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
What are su56 t-codes used for?
Differentiate between usobx_c and usobt_c
How to create users?
How do you check background jobs?
Explain protecting public keys?
Differentiate between derived role and composite role