Answer Posted / rohitha
Description
Menu
Authorization
User
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Which t-code can be used to delete old security audit logs?
What is the difference between the table buffer and the user buffer?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
what is sod in sap security?
What are the uses of an authorization group?
User is not there in User master record. Then how to trace the user?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Differentiate between temp role and copy role
What profile versions?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
what is centralize FFID?
What does the profile generator do?
What is audit information system?
what is the critical issue u are faced in your previous experience