Answer Posted / sreehari8281
determines a detour routing based upon an attribute of the request (for
example, SoD Violations Exist, Training Verification, No Role Owner)
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
What is the difference between the table buffer and the user buffer?
What authorization is required to create and maintain user master records?
What are the uses of an authorization group?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How to codify for an Item in SAP? How many digits are required for an item?
Which t-code can be used to delete old security audit logs?
List the various user types.
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is Sap security t-codes?
Can you explain document transfer-level security?
Can wildcards be used in authorizations?
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?