Answer Posted / sayali
User buffer limit can be decided by parameter auth/auth_Number_IN_USERBUFFER
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
How to do Role Design, Testing and Implementation
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What is the use of su56?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What is sap internet transaction server?
what is user base in sap security?
Explain internet-level security?
Explain protecting public keys?
What is the difference between usobx_c and usobt_c?
What are the uses of an authorization group?
How to find out who has deleted users in the system?
Tell me about derived role?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.