Answer Posted / sridhar
Whenever a Tcode is executed, if we need to enter some values as input to get the output, that input values can be stored as Variant.
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
Explain document transfer-level security?
what is user base in sap security?
What is the procedure for role modifications?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
List the various user types.
How to find out who has deleted users in the system?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What are the different types of sap security tables?
What is use of derived roles?
what is centralize FFID?
As a SAP security consultant what is the most challenged you faced in previous company?
What are su25 t-codes used for?
Can wildcards be used in authorizations?
What is stad?
What does the account assessment category specify in a purchasing document in SAP Materials Management?