Answer Posted / muthu
I hope there is no limit for user buffer now a days. N.no of authorization can perform a user.
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
what is the difference between usobt_c and usobx_c?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the procedure for role modifications?
When would you update a sap table directly? What precautions would you taje?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
How to find out who has deleted users in the system?
How to run the daily background job s for virsa violations ? thabks in advance
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
what is the main difference between the derived role and a single role?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Can wildcards be used in authorizations?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
What is sap’s grc?