ALLInterview.com :: Home Page
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Testimonials Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
   
 
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
 
Suggest New Category 
 


   


Question Asked @ Answers Views     Select
Explain how you can lock all the users at a time in SAP?    2  1870
What does SAP recommend regarding the RFC naming convention?    3  1345
Give one example of master data that is shared between AC, PC and RM? (grc 10)    1  1116
what is the use of s_tabu_nam,s_tabu_dis,s_tabu_cli    2  1956
what is the difference between customizing request and workbenchrequest?    2  2347
A user has roles that only give display access but he can still change something in the system. how?    6  1730
how can we get the email address for multiple users at a time.    3  1945
Tell me about the license types and what kind of users need to be assigned to these license types    0  533
How to restrict a newly created program ?    1  1527
How to add a new tcode to 1000 roles at a time?    2  1720
We have one request to modify role(adding field value in auth. object) and we have added it. when transporting that role, getting error "role XXXXX type is undetermined" can any body please suggest, how to fix this issue?    2  1592
i have one role in development then this role need to be available in production how to achieve this?    4  1512
Tell me about your SAP Career? (all interviews start with this queshion only...pls tell me a template for this answer)    1  1494
does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile    4  1288
what is the difference between adding tcode in menu and adding tcode using s_tcode ?    2  1536
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23   ... 25   ... 27    Next
 
 
 
 
 
Un-Answered Questions
 
 Question Views   Select
 
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS 3419
Through CTS how we come to know the Role? 554
How we can see FFID log report, before any prerequisite? 155
what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ? 662
what is the table to find out roles for which profile are not genarated and genarated.I mean to say table to find the roles in which the authorization tab is green and roles in which authorization tab is red. 4534
Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach 332
Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help 695
Please also send me details about CRM 5 and CRM 7 security issues and scenarios. 1074
How we Educated client personnel in R/3 Security and general Basis knowledge 553
What are the upgrades happened in GRC 5.3 from GRC 5.2? 1882
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION. 476
Hi, Can any one tell me the authorization objects for SOD 1185
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation 2377
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this 1818
How we Schedul and administering Background jobs. 589
E-Mail New Answers        Answer Selected Questions