Providing training for SAP Security & GRC.
SAP Security includes ECC Security,HR Security,SRM Security,CRM SECURITY,BI Security
GRC 10.0 & 10.1
For further details send an email to sapsecuritygrc5.3@gmail.com or contact 971 563356167
Answer Posted / radhika
Providing training for SAP Security & GRC.
SAP Security includes ECC Security,HR Security,SRM Security,CRM SECURITY,BI Security
GRC 10.0 & 10.1
For further details send an email to sapsecuritygrc5.3@gmail.com or contact 971 563356167
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
What are su53 t-codes used for?
How we schedule and administering background jobs?
what is the process to find that one consultant had removed a table from sap tables
When would you update a sap table directly?
What is the difference between usobx_c and usobt_c?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Explain network topology in sap systems?
What is stad?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Authorization check on s_btch_job failed. What would happen now?
What is sap cryptographic library?
What authorization is required to create and maintain user master records?
How to find out who has deleted users in the system?