why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute
5 10038. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
1 6063what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24
2 20308what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
1 3805I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?
3 15867what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
1 8817Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
IBM,
2295Post New SAP Security Questions
What is sap cryptographic library?
What authorization are required to create and maintain user master records?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
Any details about secatt apart from SAPSecurity online.com?
How do you check background jobs?
what is the difference between usobt_c and usobx_c?
How we Educated client personnel in R/3 Security and general Basis knowledge
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What are su53 t-codes used for?
How to update risk id in rule set?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
What is audit information system?