A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
707How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
630Post New SAP Security Questions
how a t code works
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Can you explain internet-level security?
What is stad?
How can sap security be improved?
What does the item category specify in a purchasing requisition in SAP Materials Management?
You want to remove a developer's and developer keys from a system. How would you do that?
What is the difference between usobx_c and usobt_c?
How to run the daily background job s for virsa violations ? thabks in advance
What is use of derived roles?
What is sap’s grc?
Can wildcards be used in authorizations?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?