Give an example of SOD with object level control & also
decide the Risk implication from the Technical standpoint.
No Answer is Posted For this Question
Be the First to Post Answer
how v Check SOD conflicts through VRAT
How would you do the 'lock all users at once'.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How to access sap security throw internet?
After maintaining authorization fields, we save and generate the profile. But it prompts for the profile name right when we click on 'Save' icon. So what is the basic difference between Saving and Profile Generating?
Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
how to secure the customizing Tcodes in sap
Hi , Currently i am working in an MNC company as an SAP Security tier1 member , we will take care of User Administration , Profile/authorization administration activities .Could any one tell me , is i am eligible to apply for an SAP Security job for 2 years experience . Could any one tell me about SOD , SOX Audit and Virsa tool , i have never worked before . Prakash
how to do Assigning authorization groups for table restrictions and program restrictions.
What is the different between single role & composite role?
What is mean By Start Profile, Default Profile, Instance Profile ? What is difference between these ?