ALLInterview.com :: Home Page
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Testimonials Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
   
 
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
 
Suggest New Category 
 


 

Question Asked @ Answers Views     Select
How to get the list of tcodes having by all users(EX-20 users)at a time?(through SUIM or TABLE) [we can get single user through SUIM->TRANSACTIONS- >EXECUTABLE USER....but same thing i want for multiple users at a time) l&t   5  7391
What is diffrence to add tcode in Menu tab(PFCG)and in S_TCODE object? ibm   4  9282
In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function? hp   3  5438
1 How many tickets usually get per day/month in support ? 2 what is the major ticket in your experience ? 3 what is the tool you are using in your company? 4 in situation we will use Derive roles in support project? 5 One User asked me the TCODE access in support project,he got approvals from all,so shal i create new role or can i add that TCODE in his roles? 6 what is ROLE OWNER? 7 What are the daily activities in your Project ? tcs   2  4528
different b/w Direct assigment and indirect role in bi security whn will go direct assignment cts   2  4598
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.    0  635
why we should not check " Generate automatically " option in SUPC? hp   1  5617
How to clean the data (users, roles, etc..) from GRC 5.3? tcs   1  4585
How to find the roles which are not contains profiles united-breweries-ub   1  6096
How to codify for an Item in SAP? How many digits are required for an item?    0  788
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?    1  4448
how do we get list of users who are having mail-id’s in SU01 (Address tab)    4  5946
Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?    3  4452
what is the user table including account number and cost center in one table? patni   3  4832
What are major changes happened in GRC 10 compared to that GRC 5.3? sony   3  17215
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23   ... 25    Next
 
 
 
 
 
Un-Answered Questions
 
 Question Views   Select
 
Support types of WOs you have faced? 395
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar 610
Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach 67
What are the upgrades happened in GRC 5.3 from GRC 5.2? 1408
what is the process to find that one consultant had removed a table from sap tables 509
How we Educated client personnel in R/3 Security and general Basis knowledge 403
Any details about secatt apart from SAPSecurity online.com? 650
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600. 635
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s) 388
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation 1928
Please also send me details about CRM 5 and CRM 7 security issues and scenarios. 910
Attributes in SE01? 621
How to run the daily background job s for virsa violations ? thabks in advance 1505
Which transaction should not be given to BASIS and DEV team in Production? 376
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5. 2468
E-Mail New Answers        Answer Selected Questions