:: Home Page
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Testimonials Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
Suggest New Category 


Question Asked @ Answers Views     Select
Tell me about the license types and what kind of users need to be assigned to these license types    0  404
How to restrict a newly created program ?    1  1099
How to add a new tcode to 1000 roles at a time?    2  1153
We have one request to modify role(adding field value in auth. object) and we have added it. when transporting that role, getting error "role XXXXX type is undetermined" can any body please suggest, how to fix this issue?    2  1075
i have one role in development then this role need to be available in production how to achieve this?    3  1106
Tell me about your SAP Career? (all interviews start with this queshion only...pls tell me a template for this answer)    1  1166
does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile    4  962
what is the difference between adding tcode in menu and adding tcode using s_tcode ?    2  1048
if user enters a tcode how the system knows what action should be done ?    2  1331
The user have auth-obj in his profile but he's not able to execute, if he run su53 he's not getting the error and also we cannot able to execute st01 if I do user buffer also its not fetching any data what should I do?    1  967
What are the 5 things you'll do if you have sap system to maintain (Sap securiy)    1  1535
How to find list of roles which are not assigned to any user    1  1481
What is a Role in Sap Security and Types of Roles and use of the role?    2  1405
Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach    0  251
Hi Friends, I am sudheer from Hyderabad. i am looking for the training on SAP SECURITY GRC. KIndly let me know what are the best institute to learn in ameerpet area for this. Thanking you in advance.    5  986
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23   ... 25   ... 27    Next
Un-Answered Questions
 Question Views   Select
what are the issues you faced with UME? 1064
Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help 681
difference between business view n technical view? 83
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar 686
How to run the daily background job s for virsa violations ? thabks in advance 1625
what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ? 630
I create one BRF+ rule and captured in TR while releasing TR , I am getting error , WHy? 88
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects 498
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments. 390
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS 448
when performing client copies what steps you need to take from CUA point of view? 876
what is the difference in grc background jobs 607
Attributes in SE01? 747
How to do Role Design, Testing and Implementation 588
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation 1102
E-Mail New Answers        Answer Selected Questions