Answer Posted / sapsecvj
Centralized refers maintaining Master data in a centralized location eg: Creating a Vendor/Customer( using XK01/XD01)
Decentralized refers maintaining Master data via delegation model eg: business transaction like creating vendor in FI module is FK01, MM is MK01, SD is VK01
Is This Answer Correct ? | 2 Yes | 3 No |
Post New Answer View All Answers
How can sap security be improved?
By which parameter number of entries are controlled in the user buffer?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is use of derived roles?
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
What are the different types of sap security tables?
How to update risk id in rule set?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
How to find ECC system, GRC system and BI system ?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
How to assign any program to user?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.