How we Provided SAP Security design, configuration, and
support for SAP Net Weaver systems running BI/BW 7.0 (Net
Weaver 2004s)
No Answer is Posted For this Question
Be the First to Post Answer
How see hierarchies in BI security
What is sap cryptographic library?
What is the difference between authorization object and authorization object class?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Is it possible to assign two roles with different validity period to a user in one shot through GRC? If yes, how
how a t code works
Can you please let me know the GRC 10 landscape, is it 2 system landscape like GRC 5.3 or 3 system landscape. As GRC 10 is ABAP Stack
11.If the user don't have the access of su53?then how to fine the user missing authorization with out using st01?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What are su01d t-codes used for?
what is the difference between customizing request and workbenchrequest?
3 Answers Deloitte, Tech Mahindra,
SAP R/3, BI, HR, EP Security, GRC AC 5.3, XI/PI Administration www.learnbasis.com