Explain protecting public keys?
No Answer is Posted For this Question
Be the First to Post Answer
Is there any transaction to see Transport Log. Means, Which data or roles have been transported from which system at what time ?
how to transport roles
What are major changes happened in GRC 10 compared to that GRC 5.3?
How will you mitigate a user against an authorization object which is decided as sensitive by Business
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Can wildcards be used in authorizations?
Is SU25 step(2nd) is mandatory when SAP up-gradation happened?
What are su10 t-codes used for?
What is Preventive and Detective controls in GRC AC 5.3?
How to create users?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
0 Answers Accenture, HCL, IBM,
In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function?