Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what reports or programs can be used to regenerate sap_all profile?

Answer Posted / mangesh

AGR_REGERNERATE_SAP_ALL

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Can you explain snc in sap security?

1089


You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

1128


What is the difference between authorization object and authorization object class?

1083


What are su56 t-codes used for?

1186


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2186


What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

1317


Explain secure store and forward?

1079


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2526


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2176


Explain x-glueb and its use in sap security.

1291


You want to remove a developer's and developer keys from a system. How would you do that?

1046


What is use of derived roles?

1192


what is sod in sap security?

1154


What are pfud t-codes used for?

1163


Explain network topology in sap systems?

1037