1 .what are the authorization switches in security
Answer / vikas srivastava
Authorization switches are used in HR security to activate
authorizaton check.
T-code OOAC is used to activate authorization check in HR
Some authorization switches are
Orgin,Orgxx,Pernr,Nnnnn,Appro,Adays,Orgpd..
Is This Answer Correct ? | 2 Yes | 0 No |
Can anybody explain (short n simple) about SOX & SoDs with 3 examples for each functional module? n ur experience on SoDs.
What is mean By Start Profile, Default Profile, Instance Profile ? What is difference between these ?
what is the difference in grc background jobs
How to access sap security throw internet?
How to Maintenance of User Master Records, Profiles, Authorizations
what is the user table including account number and cost center in one table?
a user is assigned with tcode SA38.how to restrict him to execute only a few reports,say rsusr003.
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Could you please let me know the exact step by step process for the following Questions. 1.How to get the E-Mail address for 100 users at a time. 2.While Creating BW roles what are the Authorization Objects we will use. 3.While Creating Single role what will be happened in the functional side, when entered the Template role in the derived role tab. 4.when we changed the password for more users(for example:100 users) where the password will be stored or from where you can Re-Collect the password and how will you Communicate the password to all users at a time. 5.What is Virsa? Once you entered in to the screen what it will perform. 6.What is the use of SU24 & SM24. 7.While Creating BW roles what are the Authorization Objects we will use. 8.While Creating Single role what will be happened in the functional side, when you entered the Template role in the derived role tab. 9.What is Dialog users, Batch users and Communicate users. What is the use with Communicate user. 10.Can we add one Composite role in to another Composite role at any urgent user requests or in normal user requests. 11.In Transport what type of Request we will use.Why don't we use Workbench request in transport. 12.When we added Authorization Object in Template role, at the same time what will be happen in Derived role. 13.How to Check Profile parameter. And how to find whether any transport has ended with error and where we can check. 14.How to Extract users list like who didn't login since 3 months. And In 90 Days user Locking in which table we will use. 15.What is OSS Connection and System Opening and why we have to open these. 16.What will have in one single role and how many prifiles will be in one sap cua system. 17.What is the difference between Template role & Derive role.
How to find list of authorization objects which having org fields?
Can you explain document transfer-level security?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?