How to do Role Design, Testing and Implementation
No Answer is Posted For this Question
Be the First to Post Answer
What are su22 t-codes used for?
Providing training for SAP Security & GRC. SAP Security includes ECC Security,HR Security,SRM Security,CRM SECURITY,BI Security GRC 10.0 & 10.1 For further details send an email to sapsecuritygrc5.3@gmail.com or contact 971 563356167
hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?
. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
What does the item category specify in a purchasing order in SAP Materials Management?
which ticketing tool is used in your company?Explain ticketig process?
What is a composite role?
does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile
How to find ECC system, GRC system and BI system ?
what is the difference between customizing request and workbenchrequest?
3 Answers Deloitte, Tech Mahindra,
How to know the total no. of users in particular plant in sap?
What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user