:: Home Page
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Testimonials Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
Suggest New Category 


Question Asked @ Answers Views     Select
In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function? hp   3  5286
1 How many tickets usually get per day/month in support ? 2 what is the major ticket in your experience ? 3 what is the tool you are using in your company? 4 in situation we will use Derive roles in support project? 5 One User asked me the TCODE access in support project,he got approvals from all,so shal i create new role or can i add that TCODE in his roles? 6 what is ROLE OWNER? 7 What are the daily activities in your Project ? tcs   2  4404
different b/w Direct assigment and indirect role in bi security whn will go direct assignment cts   2  4449
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.    0  608
why we should not check " Generate automatically " option in SUPC? hp   1  5479
How to clean the data (users, roles, etc..) from GRC 5.3? tcs   1  4493
How to find the roles which are not contains profiles united-breweries-ub   1  5948
How to codify for an Item in SAP? How many digits are required for an item?    0  774
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?    1  4326
how do we get list of users who are having mail-id’s in SU01 (Address tab)    4  5789
Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?    3  4325
what is the user table including account number and cost center in one table? patni   3  4710
What are major changes happened in GRC 10 compared to that GRC 5.3? sony   3  16745
What does below stand for? SAP ERP ECC ABAP BASIS infosys   3  6361
what is meant by "Password is not downward compatible"? colgate   1  5129
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23   ... 25    Next
Un-Answered Questions
 Question Views   Select
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW 417
how we do CUA configuration in Quality system 612
Attributes in SE01? 608
how we Set up Central User Administration (CUA) to manage 4 systems/clients 429
hat is transaction varient? 436
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management' 387
What are the upgrades happened in GRC 5.3 from GRC 5.2? 1374
1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security? 2351
how to we Assigning Portal groups for Business users in BI 322
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar 604
what are the issues you faced with UME? 889
what is the table to find out roles for which profile are not genarated and genarated.I mean to say table to find the roles in which the authorization tab is green and roles in which authorization tab is red. 3587
what are all the questions covered in "profiles related concepts " please let me know ? 376
E-Mail New Answers        Answer Selected Questions