what sap table can be helpful in determining the single role that is assigned to a given composite role?
1 2057Mention which t-codes are used to see the summary of the authorization object and profile details?
1 1883Post New SAP Security Questions
What profile versions?
What is the use of su56?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
what is the difference between usobt_c and usobx_c?
what is the process to find that one consultant had removed a table from sap tables
how a t code works
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What are some ap security t codes?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
Explain sap system transactions?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?