How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
1189Post New SAP Security Questions
Explain internet-level security?
How do we test security systems.
What authorization are required to create and maintain user master records?
When would you update a sap table directly? What precautions would you taje?
Explain document transfer-level security?
Pfcg proposed activities but you need only two. What would you do?
User is not there in User master record. Then how to trace the user?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
what things you have to take care before executing run system trace?
What is the difference between usobx_c and usobt_c?
What is the difference between the table buffer and the user buffer?
Differentiate between derived role and composite role
How to insert missing authorization?
what is the main difference between the derived role and a single role?
how we can see FFID if firefighter not able to see FFids ?