What does SAP recommend regarding the RFC naming convention?
Answer Posted / abdul habeeburrahman
Naming convention should be CRMGSOUTRG
C stand for Communication user
R stands for type of system like EEC= R, BW=B CRM=C
MG = target system
SOU =SID of source system in which you created RFC
TRG =SID of target system it which rfc is going to connect
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
What are su53 t-codes used for?
What is sap cryptographic library?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
What does the pfcg_time_dependency clean up?
how we do CUA configuration in Quality system
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
How we Educated client personnel in R/3 Security and general Basis knowledge
could anyone tell me how we can copy the mass roles from sap_all profiles???????
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
what is centralize FFID?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What does the account assessment category specify in a purchasing order in SAP Materials Management?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects