How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
IBM,
2253how to do Assigning authorization groups for table restrictions and program restrictions.
IBM,
1 6254how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
IBM,
2354how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
IBM,
2160how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
2342how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
IBM,
1 7182Post New SAP Security Questions
what is the different b/w su10 and su12
How to find out who has deleted users in the system?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
what is use of copy data in derived role and when we use this one ???
List the various user types.
Explain snc in sap security?
what is your ticketing tool? can we give some details about how we are getting tickets
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Authorization check on s_btch_job failed. What would happen now?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is sap cryptographic library?
when performing client copies what steps you need to take from CUA point of view?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
What appears as the last sentence in sap note 587410?