ALLInterview.com :: Home Page
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Testimonials Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
   
 
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
 
Suggest New Category 
 


 

Question Asked @ Answers Views     Select
1 How many tickets usually get per day/month in support ? 2 what is the major ticket in your experience ? 3 what is the tool you are using in your company? 4 in situation we will use Derive roles in support project? 5 One User asked me the TCODE access in support project,he got approvals from all,so shal i create new role or can i add that TCODE in his roles? 6 what is ROLE OWNER? 7 What are the daily activities in your Project ? tcs   2  4294
different b/w Direct assigment and indirect role in bi security whn will go direct assignment cts   2  4311
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.    0  594
why we should not check " Generate automatically " option in SUPC? hp   1  5355
How to clean the data (users, roles, etc..) from GRC 5.3? tcs   1  4387
How to find the roles which are not contains profiles united-breweries-ub   1  5805
How to codify for an Item in SAP? How many digits are required for an item?    0  765
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?    1  4212
how do we get list of users who are having mail-id’s in SU01 (Address tab)    4  5649
Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?    3  4208
what is the user table including account number and cost center in one table? patni   3  4593
What are major changes happened in GRC 10 compared to that GRC 5.3? sony   3  16285
What does below stand for? SAP ERP ECC ABAP BASIS infosys   3  6199
what is meant by "Password is not downward compatible"? colgate   1  5001
How to restrict Table access in SAP? wipro   2  6080
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23   ... 25    Next
 
 
 
 
 
Un-Answered Questions
 
 Question Views   Select
 
how to we Assigning Portal groups for Business users in BI 314
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600. 594
what is the difference in grc background jobs 512
Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help 599
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW 412
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management' 379
Please also send me details about CRM 5 and CRM 7 security issues and scenarios. 879
How to Maintenance of User Master Records, Profiles, Authorizations 443
hat is transaction varient? 429
1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security? 2278
how we Set up Central User Administration (CUA) to manage 4 systems/clients 421
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation 1893
How we Schedul and administering Background jobs. 442
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION. 352
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan. 550
E-Mail New Answers        Answer Selected Questions