SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 5944The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
2446What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 15152Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 9870Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 13628Post New SAP Security Questions
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
what is user base in sap security?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What does user compare do?
What authorization are required to create and maintain user master records?
User is not there in User master record. Then how to trace the user?
When would you update a sap table directly?
What is sap internet transaction server?
What is the difference between usobx_c and usobt_c?
Any details about secatt apart from SAPSecurity online.com?
Explain sap system transactions?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
what is the use of defaults tab in start menu