how we Completely designed and implemented methodology for
controlling end user access to plants, cost centers, etc.
and how we Applied to both R/3 and BW environments.
No Answer is Posted For this Question
Be the First to Post Answer
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
As a SAP security consultant what is the most challenged you faced in previous company?
what are all the questions covered in "profiles related concepts " please let me know ?
What is the main purpose of parameters, groups & personalization tabs?
what is CUA ? wat are the steps required to configure it ? and then hou does it work ?
How will you find list of transport request which are scheduled in system ?
1.why we use derived role in sap security?2.what is the technical difference between master and derived role?
Join SAP Security Group on Facebook for active discussions.
Can you explain network topology in sap systems?
. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
whts the differents between SoX ,SoD??????wht kind of work Sox do as wel .....SoD do? whts is virsa??????? and VRAT,,,,VFAT,, how it workin security.
Hi I cleared all rounds of Accenture but my preffered location was Gurgaon, as they dint had anything for me in Delhi /NCR they have put me on hold. I am worried will they call me again. please help