Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

what does user compare do in sap security?

1 2198

By which parameter number of entries are controlled in the user buffer?

1403

what is sod in sap security?

1236

how you can delete multiple roles from qa, dev and production system?

1304

What is the difference between usobx_c and usobt_c?

1084

what is authorization object and authorization object class?

1271

What is the use of role templates?

1 1437

Mention different tabs available in pfcg?

1 2885

what is pfcg_time_dependency?

1 2232

what is the main difference between the derived role and a single role?

1151

What is the different between single role & composite role?

2 2273

what sap table can be helpful in determining the single role that is assigned to a given composite role?

1 2057

What is the difference between role and a profile?

1310

What is Sap security t-codes?

1225

Mention which t-codes are used to see the summary of the authorization object and profile details?

1 1883


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What profile versions?

1193


What is the use of su56?

1148


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2140


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1256


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2244


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2726


what is the difference between usobt_c and usobx_c?

1357


what is the process to find that one consultant had removed a table from sap tables

2537


how a t code works

2453


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2342


What are some ap security t codes?

1177


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3565


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3199


Explain sap system transactions?

1182


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1052