ALLInterview.com :: Home Page
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Testimonials Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
   
 
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
 
Suggest New Category 
 


   


Question Asked @ Answers Views     Select
What is the use of usergroup in logon data tab?    2  1261
Using which table transaction code text can be displayed?    2  1642
Explain how you can lock all the users at a time in SAP?    2  1899
What does SAP recommend regarding the RFC naming convention?    3  1379
Give one example of master data that is shared between AC, PC and RM? (grc 10)    1  1139
what is the use of s_tabu_nam,s_tabu_dis,s_tabu_cli    2  2003
what is the difference between customizing request and workbenchrequest?    2  2391
A user has roles that only give display access but he can still change something in the system. how?    6  1765
how can we get the email address for multiple users at a time.    3  1976
Tell me about the license types and what kind of users need to be assigned to these license types    0  540
How to restrict a newly created program ?    1  1553
How to add a new tcode to 1000 roles at a time?    2  1757
We have one request to modify role(adding field value in auth. object) and we have added it. when transporting that role, getting error "role XXXXX type is undetermined" can any body please suggest, how to fix this issue?    2  1621
i have one role in development then this role need to be available in production how to achieve this?    4  1538
Tell me about your SAP Career? (all interviews start with this queshion only...pls tell me a template for this answer)    1  1516
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23   ... 25   ... 27    Next
 
 
 
 
 
Un-Answered Questions
 
 Question Views   Select
 
Through CTS how we come to know the Role? 560
what is the table to find out roles for which profile are not genarated and genarated.I mean to say table to find the roles in which the authorization tab is green and roles in which authorization tab is red. 4554
what is the length of user buffer 107
I create one BRF+ rule and captured in TR while releasing TR , I am getting error , WHy? 261
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan. 707
How to Maintenance of User Master Records, Profiles, Authorizations 586
hat is transaction varient? 593
how to we Assigning Portal groups for Business users in BI 504
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules 634
Any details about secatt apart from SAPSecurity online.com? 819
how we can see FFID if firefighter not able to see FFids ? 123
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s) 518
Please also send me details about CRM 5 and CRM 7 security issues and scenarios. 1079
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint. 1830
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation 2383
E-Mail New Answers        Answer Selected Questions