| Other SAP Security Interview Questions |
|| Asked @
|Whr will u find u Error logs in BI security and What
are Error logs will come and how will u solve that
|What is the difference between Parent role and Composite role
|1.Is it possible to have a request type by which we can change
the validity period of a user?
If possible, then what are the actions?
|What is the use of RSECADMIN ?
|what is the advantage of cua from a layman/manager point of
|What is mean By Start Profile, Default Profile, Instance Profile ? What is difference between these ?
|Whay can't you assign a composite role to another composite
role ? Need clear explaintion.
|How to assign sap_all to end user if i have approval?remember
i do not have GRC.
|what is the rule set in GRC?
|where do you find the manually added tcodes in role tables.
|How to create a custom T-code tell me the procedure
How to add an authorization object for that custom t-code
If any authorization object has been modified in SU24, how
it will be effected in the system?
If u has issue like add one AO in 50 roles what would u do?
(If all 50 are single roles)?
What is rule?
What kind of reports does perform at the R3 level?
|How to find the roles which are not contains profiles
|For more SAP Security Interview Questions Click Here |