:: Home Page      
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Testimonials Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
Suggest New Category 


Question Asked @ Answers Views     Select
How to codify for an Item in SAP? How many digits are required for an item?    0  301
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?    1  924
how do we get list of users who are having mail-id’s in SU01 (Address tab)    4  1735
Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?    3  1236
what is the user table including account number and cost center in one table? patni   3  1414
What are major changes happened in GRC 10 compared to that GRC 5.3? sony   3  3604
What does below stand for? SAP ERP ECC ABAP BASIS infosys   3  1353
what is meant by "Password is not downward compatible"? colgate   1  1396
How to restrict Table access in SAP? wipro   2  1780
What is difference between BW and BI Security? accenture   2  1360
How to create user in SAP without giving LASTNAME and INITIAL PASSWORD ? accenture   1  1940
What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code? deloitte   6  2355
in which table we can find all authorization groups cognizent   5  1648
Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one. cts   2  1027
How to identify which Authorization Objects contains which fields \ activities? ibm   6  1643
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23    Next
Un-Answered Questions
 Question Views   Select
when performing client copies what steps you need to take from CUA point of view? 332
what are the issues you faced with UME? 429
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint. 578
How we Schedul and administering Background jobs. 218
what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ? 232
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help 205
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules 267
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar 300
How we Educated client personnel in R/3 Security and general Basis knowledge 190
what are all the questions covered in "profiles related concepts " please let me know ? 245
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution.. 286
How to codify for an Item in SAP? How many digits are required for an item? 301
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s) 157
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation 416
E-Mail New Answers        Answer Selected Questions