Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
1 2152Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???
1 27971.why we use derived role in sap security?2.what is the technical difference between master and derived role?
KPMG,
1 2241Post New SAP Security Questions
could anyone tell me how we can copy the mass roles from sap_all profiles???????
What is sap internet transaction server?
What is the difference between authorization object and authorization object class?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
Can you explain internet-level security?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Explain network topology in sap systems?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
How we schedule and administering background jobs?
Can you explain network topology in sap systems?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Which transaction should not be given to BASIS and DEV team in Production?
What profile versions?
What are se09 t-codes used for?