Someone has deleted users in our system, and I am eager to find out who. Is there a table where this is logged?
1 1373Is there a table for authorizations where I can quickly see the values entered in a group of fields?
761Post New SAP Security Questions
Authorization check on s_btch_job failed. What would happen now?
What authorization is required to create and maintain user master records?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
what is the critical issue u are faced in your previous experience
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
What is use of derived roles?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What does user compare do?
What are su56 t-codes used for?
How do we test security systems.
Explain sap system transactions?
What is a composite role?
What does the item category specify in a purchasing order in SAP Materials Management?
What are su25 t-codes used for?
Pfcg proposed activities but you need only two. What would you do?