Answer Posted / muthu
I hope there is no limit for user buffer now a days. N.no of authorization can perform a user.
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
Explain internet-level security?
when performing client copies what steps you need to take from CUA point of view?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
what is the use of defaults tab in start menu
How do we test security systems.
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
How to insert missing authorization?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Pfcg proposed activities but you need only two. What would you do?
By which parameter number of entries are controlled in the user buffer?
what is the main difference between the derived role and a single role?
Which t-code can be used to delete old security audit logs?
What are st01 t-codes used for?
How we Educated client personnel in R/3 Security and general Basis knowledge