:: Home Page      
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
Suggest New Category 


Question Asked @ Answers Views     Select
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?    1  818
how do we get list of users who are having mail-id’s in SU01 (Address tab)    4  1596
Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?    3  1117
what is the user table including account number and cost center in one table? patni   2  1296
What are major changes happened in GRC 10 compared to that GRC 5.3? sony   3  3423
What does below stand for? SAP ERP ECC ABAP BASIS infosys   3  1207
what is meant by "Password is not downward compatible"? colgate   1  1282
How to restrict Table access in SAP? wipro   2  1644
What is difference between BW and BI Security? accenture   2  1258
How to create user in SAP without giving LASTNAME and INITIAL PASSWORD ? accenture   1  1818
What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code? deloitte   6  2141
in which table we can find all authorization groups cognizent   4  1517
Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one. cts   2  924
How to identify which Authorization Objects contains which fields \ activities? ibm   6  1500
I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?    1  968
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23    Next
Un-Answered Questions
 Question Views   Select
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this 522
how we Set up Central User Administration (CUA) to manage 4 systems/clients 238
Tables so far used? 119
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible. 482
How we Provided Security design, configuration, and support for SAP Enterprise Portals 159
How we Creat Mass users via writing LSMW scripts. 1260
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules 257
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS 151
How to run the daily background job s for virsa violations ? thabks in advance 438
Attributes in SE01? 347
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar 288
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint. 531
Which transaction should not be given to BASIS and DEV team in Production? 184
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments. 166
How we Schedul and administering Background jobs. 198
E-Mail New Answers        Answer Selected Questions