Answer Posted / sreehari8281
determines a detour routing based upon an attribute of the request (for
example, SoD Violations Exist, Training Verification, No Role Owner)
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain protecting public keys?
Why is it important to delete sap-new profile? What steps will you take to do this?
What does the profile generator do?
What authorization are required to create and maintain user master records?
what things you have to take care before executing run system trace?
How we Educated client personnel in R/3 Security and general Basis knowledge
What does the pfcg_time_dependency clean up?
What are some ap security t codes?
what is user base in sap security?
How to run the daily background job s for virsa violations ? thabks in advance
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
How to find ECC system, GRC system and BI system ?
Can you explain snc in sap security?