A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
1192How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
1060Post New SAP Security Questions
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
When would you update a sap table directly?
Authorization check on s_btch_job failed. What would happen now?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
Explain protecting public keys?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Can you explain network topology in sap systems?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Can you explain transport system-level security?
What happens to change documents when they are transported to the production system?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
What is sap’s grc?
How to insert missing authorization?
Explain snc in sap security?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?