How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
IBM,
1783how to do Assigning authorization groups for table restrictions and program restrictions.
IBM,
1 5453how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
IBM,
1871how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
IBM,
1694how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
1846how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
IBM,
1 6351Post New SAP Security Questions
what things you have to take care before executing run system trace?
Can you explain snc in sap security?
Which t-code can be used to delete old security audit logs?
What is t code?
Can you explain internet-level security?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
what are the issues you faced with UME?
How to find ECC system, GRC system and BI system ?
Pfcg proposed activities but you need only two. What would you do?
Which transaction code is used to display the user buffer?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
Can wildcards be used in authorizations?
Differentiate between saml token profile and a sap logon ticket
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?