1.Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
2 12341Hi I cleared all rounds of Accenture but my preffered location was Gurgaon, as they dint had anything for me in Delhi /NCR they have put me on hold. I am worried will they call me again. please help
2 7608whts the differents between SoX ,SoD??????wht kind of work Sox do as wel .....SoD do? whts is virsa??????? and VRAT,,,,VFAT,, how it workin security.
IBM,
3 14904Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
IBM,
3565How to check to which web links user has access ? bcoz its not there any option in SUIM for this search and we add web links/reports while creating role. So how to check that ?
2 7484Post New SAP Security Questions
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
Pfcg proposed activities but you need only two. What would you do?
Is it possible to change role template? How?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Differentiate between derived role and composite role
What is Sap security t-codes?
Explain document transfer-level security?
What are some ap security t codes?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
Can you explain secure store and forward?
What does the profile generator do?
How to find ECC system, GRC system and BI system ?
What is the procedure for role modifications?
what is the different b/w su10 and su12