we have one parent role and we derived five roles from that and i assigned these derived roles to five users now i want to restrict 2 users for couple of T-codes and rest of the users work with those T-codes , How we can solve the problem
8 16819Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 13633Post New Cognizant SAP Security Interview Questions
What are the different resource types in sap supply chain? : supply chain management
Does chkdsk fix corrupt files?
Explain about a time the scope of a project changed midway through. How did you respond?
Which is best pdo or mysqli?
What is proxy in hibernate?
Do you know any other accounting application?
What is the purpose of xssfworkbook class in apache poi?
Which one is a preferred language C or C++? Why?
Define fixed layout.
How do I lock an excel spreadsheet?
What is visual basic.net culture?
hi frnds...pls send me aptransco previous papers .....pls..pls,,,(madhar.rocking@gmail.com)and suggest me some websites
What will happen if wrong fuel is burnt in engine?
Which is not commonly used programming language for ai?
What are the steps you would take to create the pay scale types.