Answer Posted / tapan
dialog, reference, communication, services, system
| Is This Answer Correct ? | 49 Yes | 0 No |
Post New Answer View All Answers
Explain protecting public keys?
how to do Reporting and Analysis authorizations
Explain snc in sap security?
What does the item category specify in a purchasing requisition in SAP Materials Management?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
User is not there in User master record. Then how to trace the user?
When would you update a sap table directly? What precautions would you taje?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
how you can delete multiple roles from qa, dev and production system?
what is authorization object and authorization object class?
What are se10 t-codes used for?
what is use of copy data in derived role and when we use this one ???
what is user base in sap security?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How can sap security be improved?